CVE-2024-21585Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
5.9MEDIUMNVD
EPSS
0.1%
top 64.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 12

Description

An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing protocol daemon (rpd) process to crash and restart, leading to a Denial of Service (DoS) condition. Continued BGP session flapping will create a sustained Denial of Service (DoS) condition. This issue only affects r

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.421.4R3-S5-EVO+6
CVEListV5juniper_networks/junos_os21.221.2R3-S7+8
NVDjuniper/junos_os_evolved7 versions+6
NVDjuniper/junos9 versions+8

🔴Vulnerability Details

2
GHSA
GHSA-3r4r-ffrp-777w: An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an una2024-01-12
CVEList
Junos OS and Junos OS Evolved: BGP session flaps on NSR-enabled devices can cause rpd crash2024-01-12

📋Vendor Advisories

1
Juniper
CVE-2024-21585: An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an un2024-01-12
CVE-2024-21585 — Networks Junos OS vulnerability | cvebase