CTP2024-AC-02
Chassis
· CTP Series
Is the CTP2024-AC-02 still supported?
No. Juniper ended support for the CTP2024-AC-02 on 2022-12-31. No further security fixes will be issued. See Juniper's lifecycle bulletin.
When does the CTP2024-AC-02 reach end of support?
Juniper support for the CTP2024-AC-02 ends on 2022-12-31.
What replaces the CTP2024-AC-02?
Juniper has not published a successor model for the CTP2024-AC-02.
What known-exploited CVEs apply to the CTP2024-AC-02 past end of support?
7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform the CTP2024-AC-02 runs. These will not be patched on this device because it is past the Juniper security-support date. See the Known Exploited Vulnerabilities table below for the full list.
Known Exploited Vulnerabilities
This device is past Juniper's security-support date. 7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform it runs. Juniper is not issuing patches for this model. Isolate, compensate, or refresh.
| CVE | KEV added | Vulnerability | Flags |
|---|---|---|---|
CVE-2025-21590
|
Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability | ||
CVE-2023-36844
|
Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | ||
CVE-2023-36845
|
Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | ||
CVE-2023-36846
|
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2023-36847
|
Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2023-36851
|
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2020-1631
|
Juniper Junos OS Path Traversal Vulnerability |
Source: CISA Known Exploited Vulnerabilities catalog. The Ransomware flag reflects CISA's own knownRansomwareCampaignUse field, set when the CVE has been observed in ransomware campaigns per their threat intel. It's not a property of the vulnerability description itself.
Correlation is at the platform level, not per-OS-version. Not exhaustive: KEV only lists actively-exploited CVEs and many relevant unexploited vulnerabilities are not here. Verify against vendor security advisories (PSIRT, JSA, PAN-SA) and NVD before acting. See compensating controls if refresh isn't immediate.
CTP2024-AC-02 Lifecycle Overview
The Juniper CTP2024-AC-02 is a chassis product in the Juniper CTP series. This product has reached end of life as of , meaning Juniper no longer provides technical support, software updates, or hardware replacement for this product. It was last available for purchase on . Organizations still running the CTP2024-AC-02 should plan a migration .
Lifecycle Milestones
| Lifecycle notice published | 9y 7mo ago | |
|---|---|---|
| End of sale | 9y 7mo ago | |
| Last date of support | 3y 4mo ago |
Additional Dates
| Last Warranty Conversion Date | 8y 7mo ago | |
|---|---|---|
| Same Day Support Discontinued Date | 7y 7mo ago |