{"Unusual or Exceptional Conditions Can Cause Denial of Service (DoS) Impacting Device Availability","High Amount of Specific Layer 2 Packets Can Cause Routing Protocol Daemon (rpd) to Utilize All CPU Resources, Requiring Manual Restart"}
CVE-2024-39517

6.5MEDIUM

Key Information:

Vendor
CVE Published:
10 July 2024

Badges

šŸ‘¾ Exploit Exists

Summary

An Improper Check for Unusual or Exceptional Conditions vulnerability in theĀ Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).

In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services.

This issue affects both IPv4 and IPv6 implementations. This issue affects Junos OS: All versions earlier thanĀ 21.4R3-S7; 22.1Ā versions earlier than 22.1R3-S5; 22.2 versions earlier thanĀ 22.2R3-S3; 22.3 versions earlier thanĀ 22.3R3-S3; 22.4 versions earlier thanĀ 22.4R3-S2; 23.2 versions earlier thanĀ 23.2R2; 23.4 versions earlier thanĀ 23.4R1-S1.

Junos OS Evolved: All versions earlier thanĀ 21.4R3-S7-EVO; 22.1-EVO versions earlier thanĀ 22.1R3-S5-EVO; 22.2-EVO versions earlier thanĀ 22.2R3-S3-EVO; 22.3-EVO versions earlier than 22.3R3-S3-EVO; 22.4-EVO versions earlier thanĀ 22.4R3-S2-EVO; 23.2-EVO versions earlier thanĀ 23.2R2-EVO; 23.4-EVO versions earlier thanĀ 23.4R1-S1-EVO, 23.4R2-EVO.

Affected Version(s)

Junos OS 0 < 21.2R3-S8

Junos OS 21.4 < 21.4R3-S7

Junos OS 22.1 < 22.1R3-S5

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • šŸ‘¾

    Exploit known to exist

  • Vulnerability published

Collectors

NVD DatabaseMitre Database
.