CVE-2024-39552Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
8.7HIGHNVD
EPSS
1.3%
top 20.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, RPD crashes and restarts. Continuous receipt of the malformed BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impac

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.3-EVO21.3R3-S5-EVO+8
CVEListV5juniper_networks/junos_os21.221.2R3-S7+8
NVDjuniper/junos< 20.4+9

🔴Vulnerability Details

2
GHSA
GHSA-3fgw-53wh-c98c: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved al2024-07-11
CVEList
Junos OS and Junos OS Evolved: Malformed BGP UPDATE causes RPD crash2024-07-11

📋Vendor Advisories

1
Juniper
CVE-2024-39552: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved al2024-07-11
CVE-2024-39552 — Networks Junos OS vulnerability | cvebase