CVE-2024-39547Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
8.7HIGHNVD
EPSS
0.0%
top 87.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11

Description

An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to cause a CPU-based Denial of Service (DoS). If specially crafted TCP traffic is received by the control plane, or a TCP session terminates unexpectedly, it will cause increased control plane CPU utilization by the rpd-server process. While not explici

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved22.2-EVO22.2R3-S4-EVO+4
CVEListV5juniper_networks/junos_os21.421.4R3-S7+7

🔴Vulnerability Details

2
GHSA
GHSA-37f4-v37x-33qj: An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an2024-10-11
CVEList
Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization2024-10-11

📋Vendor Advisories

1
Juniper
CVE-2024-39547: An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an2024-10-11
CVE-2024-39547 — Networks Junos OS vulnerability | cvebase