{"vulnerability": "CVE-2024-39553", "sightings": [{"uuid": "80ae3b9c-a74f-4a17-b65e-be05e0ac7dc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39553", "type": "seen", "source": "https://t.me/cvedetector/679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39553 - An Exposure of Resource to Wrong Sphere vulnerabil\", \n  \"Content\": \"CVE ID : CVE-2024-39553 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Exposure of Resource to Wrong Sphere vulnerability in the sampling service\u00a0of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited availability impacting Denial of Service (DoS) and allows unauthorized network access to the device, potentially impacting system integrity.  \n  \nThis issue only happens when inline jflow is configured.  \n  \nThis does not impact any forwarding traffic. The impacted services MSVCS-DB app crashes momentarily and recovers by itself.\u00a0  \n  \nThis issue affects Juniper Networks Junos OS Evolved:\u00a0  \n  *  21.4 versions earlier than 21.4R3-S7-EVO;\u00a0  \n  *  22.2 versions earlier than\u00a022.2R3-S3-EVO;  \n  *  22.3 versions earlier than 22.3R3-S2-EVO;  \n  *  22.4 versions earlier than 22.4R3-EVO;  \n  *  23.2 versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:50.000000Z"}]}