{"Junos OS affected by Stack-based Buffer Overflow vulnerability","Junos OS Evolved affected by Stack-based Buffer Overflow vulnerability","Denial of Service (DoS) condition caused by specific EVPN type-5 route receipt"}
CVE-2024-30394
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 12 April 2024
Badges
Summary
A stack-based buffer overflow vulnerability exists within the Routing Protocol Daemon (rpd) of Junos OS and Junos OS Evolved. This vulnerability can be exploited by an unauthenticated network-based attacker through the receipt of a crafted specific EVPN type-5 route via BGP. Successful exploitation causes the rpd process to crash and restart, leading to a Denial of Service (DoS) condition, which can be sustained if the attacker continuously sends the malicious route. The vulnerability impacts multiple versions of Junos OS and Junos OS Evolved, underscoring the importance of timely updates and strict network monitoring to mitigate potential threats.
Affected Version(s)
Junos OS 0 < 21.2R3-S7
Junos OS 21.4 < 21.4R3-S5
Junos OS 22.1 < 22.1R3-S4
References
CVSS V3.1
Timeline
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved