CVE-2024-21596Heap-based Buffer Overflow in Networks Junos OS

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 77.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 12

Description

A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). If an attacker sends a specific BGP UPDATE message to the device, this will cause a memory overwrite and therefore an RPD crash and restart in the backup Routing Engine (RE). Continued receipt of these packets will cause a sustained Denial of Service (DoS) condition in the backup RE

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.4-EVO21.4R3-S5-EVO+6
CVEListV5juniper_networks/junos_os21.221.2R3-S7+9
NVDjuniper/junos_os_evolved8 versions+7
NVDjuniper/junos10 versions+9

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: A specific BGP UPDATE message will cause a crash in the backup Routing Engine in NSR-enabled devices2024-01-12
GHSA
GHSA-rj2r-9q5p-4c4w: A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenti2024-01-12

📋Vendor Advisories

1
Juniper
CVE-2024-21596: A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthent2024-01-12
CVE-2024-21596 — Heap-based Buffer Overflow | cvebase