Denial of Service Vulnerability in Routing Protocol daemon (rpd)
CVE-2024-39515
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 9 October 2024
Badges
Summary
A vulnerability exists within the routing protocol daemon (rpd) of Juniper Networks' Junos OS and Junos OS Evolved, stemming from improper validation of consistency within input data. This allows unauthenticated network-based attackers to exploit a specially crafted BGP packet, potentially leading to a crash and restart of the rpd service. A sustained bombardment of this malformed packet can induce a prolonged Denial of Service (DoS) condition, where the rpd may occasionally fail to restart automatically, necessitating a manual intervention via the CLI command 'restart routing'. The vulnerability affects both iBGP and eBGP sessions over IPv4 and IPv6, specifically targeting systems with BGP traceoptions enabled.
Affected Version(s)
Junos OS 0 < 21.4R3-S8
Junos OS 22.2 < 22.2R3-S5
Junos OS 22.3 < 22.3R3-S4
References
CVSS V3.1
Timeline
- 👾
Exploit known to exist
Vulnerability published