CVE-2024-47507 — Improper Check for Unusual or Exceptional Conditions in Networks Junos OS
Severity
6.9MEDIUMNVD
EPSS
0.3%
top 48.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11
Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an integrity impact to the downstream devices.
When a peer sends a BGP update message which contains the aggregator attribute with an ASN value of zero (0), rpd accepts and propagates this attribute, which can cause issues for downstream BGP peers receiving this.
This issue affect…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
Affected Packages4 packages
🔴Vulnerability Details
2CVEList▶
Junos OS and Junos OS Evolved: BGP update message containing aggregator attribute with an ASN value of zero (0) is accepted↗2024-10-11
GHSA▶
GHSA-8qjw-q35q-vjp5: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS E↗2024-10-11
📋Vendor Advisories
1Juniper▶
CVE-2024-47507: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS E↗2024-10-11