Improper Handling of Exceptional Conditions in Junos OS and Junos OS Evolved Leads to Denial of Service (DoS)
CVE-2024-39555
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 10 July 2024
Summary
A vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks' Junos OS and Junos OS Evolved manifests as an improper handling of exceptional conditions. Affected systems permit attackers, who have an established BGP session, to send specifically malformed BGP update messages that induce resets of the session. The issue particularly arises when segment routing is enabled, leading to improper parsing of tunnel encapsulation attributes. This can escalate to a sustained Denial of Service (DoS) condition as continued receipt of malformed messages disrupts normal operations of the network, affecting both eBGP and iBGP across IPv4 and IPv6 implementations.
Affected Version(s)
Junos OS 0 < 21.4R3-S8
Junos OS 22.2 < 22.2R3-S4
Junos OS 22.3 < 22.3R3-S3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved