Junos OS vulnerable to Denial of Service (DoS) via malformed BGP update
CVE-2024-30395

7.5HIGH

Key Information:

Vendor
CVE Published:
12 April 2024

Badges

👾 Exploit Exists

Summary

An input validation vulnerability exists in the Routing Protocol Daemon (RPD) for Junos OS and Junos OS Evolved. This flaw permits an unauthenticated attacker to exploit a malformed tunnel encapsulation attribute within a BGP update, potentially leading to a Denial of Service (DoS) condition. When such malformed data is received via an established BGP session, it triggers an unexpected crash and restart of the RPD, disrupting network services. This issue affects several versions of Junos OS and Junos OS Evolved, highlighting the need for timely updates and patches to mitigate associated risks.

Affected Version(s)

Junos OS 0 < 21.2R3-S7

Junos OS 21.3 < 21.3R3-S5

Junos OS 21.4 < 21.4R3-S5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Juniper SIRT would like to acknowledge and thank Matteo Memelli from Amazon for responsibly reporting this vulnerability.
.