CVE-2024-47491Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
8.2HIGHNVD
EPSS
0.2%
top 63.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11

Description

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts. Continuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impact

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.222.2R3-S4-EVO+4
CVEListV5juniper_networks/junos_os22.222.2R3-S4+4
NVDjuniper/junos< 21.4+5

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash2024-10-11
GHSA
GHSA-79v4-xhfm-cr97: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-10-11

📋Vendor Advisories

1
Juniper
CVE-2024-47491: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2024-10-11
CVE-2024-47491 — Networks Junos OS vulnerability | cvebase