CVE-2024-39552

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, RPD crashes and restarts. Continuous receipt of the malformed BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session. This issue affects: Juniper Networks Junos OS: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R2. Juniper Networks Junos OS Evolved: * All versions earlier than 21.2R3-S7; * 21.3-EVO versions earlier than 21.3R3-S5; * 21.4-EVO versions earlier than 21.4R3-S8; * 22.1-EVO versions earlier than 22.1R3-S4; * 22.2-EVO versions earlier than 22.2R3-S3; * 22.3-EVO versions earlier than 22.3R3-S2; * 22.4-EVO versions earlier than 22.4R3; * 23.2-EVO versions earlier than 23.2R2.
Configurations

No configuration.

History

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://supportportal.juniper.net/JSA75726 - () https://supportportal.juniper.net/JSA75726 -

30 Jul 2024, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N', 'source': 'sirt@juniper.net'}
Summary
  • (es) Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en Routing Protocol Daemon (RPD) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red provoque que el proceso RPD falle, lo que provoca una denegación de servicio (DoS). Cuando se recibe un paquete de ACTUALIZACIÓN de BGP con formato incorrecto a través de una sesión BGP establecida, RPD falla y se reinicia. La recepción continua de mensajes de ACTUALIZACIÓN de BGP con formato incorrecto creará una condición de denegación de servicio (DoS) sostenida para los dispositivos afectados. Este problema afecta a eBGP e iBGP, tanto en implementaciones de IPv4 como de IPv6. Este problema requiere que un atacante remoto tenga al menos una sesión BGP establecida. Este problema afecta a: Juniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S9; * Versiones 21.2 anteriores a 21.2R3-S7; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S6; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3-S3; * Versiones 22.3 anteriores a 22.3R3-S2; * Versiones 22.4 anteriores a 22.4R3; * Versiones 23.2 anteriores a 23.2R2. Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S7; * Versiones 21.3-EVO anteriores a 21.3R3-S5; * Versiones 21.4-EVO anteriores a 21.4R3-S8; * Versiones 22.1-EVO anteriores a 22.1R3-S4; * Versiones 22.2-EVO anteriores a 22.2R3-S3; * Versiones 22.3-EVO anteriores a 22.3R3-S2; * Versiones 22.4-EVO anteriores a 22.4R3; * Versiones 23.2-EVO anteriores a 23.2R2.

11 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-11 17:15

Updated : 2024-11-21 09:27


NVD link : CVE-2024-39552

Mitre link : CVE-2024-39552

CVE.ORG link : CVE-2024-39552


JSON object : View

Products Affected

No product.

CWE
CWE-755

Improper Handling of Exceptional Conditions