Denial of Service Vulnerability in Routing Protocol daemon (rpd)
CVE-2024-39515

7.5HIGH

Key Information:

Vendor
CVE Published:
9 October 2024

Badges

👾 Exploit Exists

Summary

A vulnerability exists within the routing protocol daemon (rpd) of Juniper Networks' Junos OS and Junos OS Evolved, stemming from improper validation of consistency within input data. This allows unauthenticated network-based attackers to exploit a specially crafted BGP packet, potentially leading to a crash and restart of the rpd service. A sustained bombardment of this malformed packet can induce a prolonged Denial of Service (DoS) condition, where the rpd may occasionally fail to restart automatically, necessitating a manual intervention via the CLI command 'restart routing'. The vulnerability affects both iBGP and eBGP sessions over IPv4 and IPv6, specifically targeting systems with BGP traceoptions enabled.

Affected Version(s)

Junos OS 0 < 21.4R3-S8

Junos OS 22.2 < 22.2R3-S5

Junos OS 22.3 < 22.3R3-S4

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

Collectors

NVD DatabaseMitre Database

Credit

Juniper SIRT would like to acknowledge and thank Craig Dods from Meta’s Infrastructure Security Engineering team for responsibly reporting this vulnerability.
.