Improper Handling of Exceptional Conditions Leads to Denial of Service Vulnerability in Juniper Networks
CVE-2024-39547

7.5HIGH

Key Information:

Vendor
CVE Published:
11 October 2024

Summary

A vulnerability exists within the rpd-server of Juniper Networks' Junos OS and Junos OS Evolved that allows unauthenticated network-based attackers to exploit improper handling of exceptional conditions. By sending carefully crafted TCP traffic to the routing engine, these attackers can induce high CPU utilization at the control plane, resulting in a Denial of Service. This vulnerability becomes particularly severe when RIB sharding is enabled, leading to unexpected task accounting reads by the RPD Server jobs. Affected systems include various versions of Junos OS and Junos OS Evolved, with both requiring urgent attention for system management and security protocols.

Affected Version(s)

Junos OS cRPD 0 < 21.2R3-S8

Junos OS cRPD 21.4 < 21.4R3-S7

Junos OS cRPD 22.1 < 22.1R3-S6

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.