{"Unusual or Exceptional Conditions Can Cause Denial of Service (DoS) Impacting Device Availability","High Amount of Specific Layer 2 Packets Can Cause Routing Protocol Daemon (rpd) to Utilize All CPU Resources, Requiring Manual Restart"}
CVE-2024-39517
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 10 July 2024
Badges
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in theĀ Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).
In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services.
This issue affects both IPv4 and IPv6 implementations. This issue affects Junos OS: All versions earlier thanĀ 21.4R3-S7; 22.1Ā versions earlier than 22.1R3-S5; 22.2 versions earlier thanĀ 22.2R3-S3; 22.3 versions earlier thanĀ 22.3R3-S3; 22.4 versions earlier thanĀ 22.4R3-S2; 23.2 versions earlier thanĀ 23.2R2; 23.4 versions earlier thanĀ 23.4R1-S1.
Junos OS Evolved: All versions earlier thanĀ 21.4R3-S7-EVO; 22.1-EVO versions earlier thanĀ 22.1R3-S5-EVO; 22.2-EVO versions earlier thanĀ 22.2R3-S3-EVO; 22.3-EVO versions earlier than 22.3R3-S3-EVO; 22.4-EVO versions earlier thanĀ 22.4R3-S2-EVO; 23.2-EVO versions earlier thanĀ 23.2R2-EVO; 23.4-EVO versions earlier thanĀ 23.4R1-S1-EVO, 23.4R2-EVO.
Affected Version(s)
Junos OS 0 < 21.2R3-S8
Junos OS 21.4 < 21.4R3-S7
Junos OS 22.1 < 22.1R3-S5
References
CVSS V3.1
Timeline
- š¾
Exploit known to exist
Vulnerability published