Improper Handling of Exceptional Conditions in Junos OS and Junos OS Evolved Leads to Denial of Service (DoS)
CVE-2024-39555

7.5HIGH

Key Information:

Vendor
CVE Published:
10 July 2024

Summary

A vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks' Junos OS and Junos OS Evolved manifests as an improper handling of exceptional conditions. Affected systems permit attackers, who have an established BGP session, to send specifically malformed BGP update messages that induce resets of the session. The issue particularly arises when segment routing is enabled, leading to improper parsing of tunnel encapsulation attributes. This can escalate to a sustained Denial of Service (DoS) condition as continued receipt of malformed messages disrupts normal operations of the network, affecting both eBGP and iBGP across IPv4 and IPv6 implementations.

Affected Version(s)

Junos OS 0 < 21.4R3-S8

Junos OS 22.2 < 22.2R3-S4

Junos OS 22.3 < 22.3R3-S3

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.