Double-Free Vulnerability in Juniper Networks Junos OS Routing Daemon
CVE-2024-39564
8.7HIGH
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 5 February 2025
Badges
👾 Exploit Exists
Summary
A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks' Junos OS and Junos OS Evolved permits an attacker to send a malformed BGP Path attribute update. This action allocates memory to log the erroneous path attribute. The resulting double free of memory can cause the rpd to crash, leading to a Denial of Service (DoS). The affected versions include Junos OS and Junos OS Evolved from 22.4 before 22.4R3-S4.
Affected Version(s)
Junos OS 22.4 < 22.4R3-S4
Junos OS Evolved 22.4 < 22.4R3-S3-EVO
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Juniper SIRT would like to acknowledge and thank Craig Dods ([email protected]) from Meta for responsibly reporting this vulnerability.