CVE-2024-30382Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
8.7HIGHNVD
EPSS
0.5%
top 34.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS). This issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below). This issue affects: J

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.321.3R3-EVO+3
CVEListV5juniper_networks/junos_os21.221.2R3-S8+4
NVDjuniper/junos< 20.4+5

🔴Vulnerability Details

2
GHSA
GHSA-83pq-frch-8xf2: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-04-12
CVEList
Junos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured2024-04-12

📋Vendor Advisories

1
Juniper
CVE-2024-30382: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-04-12
CVE-2024-30382 — Networks Junos OS vulnerability | cvebase