CVE-2024-39541Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 64.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart. This issue affects: Junos OS: * 22.4 versions before 22.4R3-S1, *

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.4-EVO22.4R3-S2-EVO+2
NVDjuniper/junos_os_evolved22.4, 23.2, 23.4+2
CVEListV5juniper_networks/junos_os22.422.4R3-S1+2
NVDjuniper/junos22.4, 23.2, 23.4+2

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Inconsistent information in the TE database can lead to an rpd crash2024-07-11
GHSA
GHSA-55rx-w9v4-hwvv: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-07-11

📋Vendor Advisories

1
Juniper
CVE-2024-39541: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-07-11
CVE-2024-39541 — Networks Junos OS vulnerability | cvebase