Denial of Service Vulnerability in Routing Protocol daemon (rpd)
CVE-2024-39515
Key Information:
- Vendor
Juniper Networks
- Status
- Vendor
- CVE Published:
- 9 October 2024
Badges
What is CVE-2024-39515?
A vulnerability exists within the routing protocol daemon (rpd) of Juniper Networks' Junos OS and Junos OS Evolved, stemming from improper validation of consistency within input data. This allows unauthenticated network-based attackers to exploit a specially crafted BGP packet, potentially leading to a crash and restart of the rpd service. A sustained bombardment of this malformed packet can induce a prolonged Denial of Service (DoS) condition, where the rpd may occasionally fail to restart automatically, necessitating a manual intervention via the CLI command 'restart routing'. The vulnerability affects both iBGP and eBGP sessions over IPv4 and IPv6, specifically targeting systems with BGP traceoptions enabled.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Junos OS 0 < 21.4R3-S8
Junos OS 22.2 < 22.2R3-S5
Junos OS 22.3 < 22.3R3-S4
References
CVSS V3.1
Timeline
- 👾
Exploit known to exist
Vulnerability published