Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash (CVE-2024-39549)
CVE number = CVE-2024-39549
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, attacker to cause the RPD process to crash leading to a Denial of Service (DoS).
When a malformed BGP path attributes packet is received over an established BGP session, RPD crashes and restarts.
Continuous receipt of the malformed BGP path attributes messages will create a sustained Denial of Service (DoS) condition for impacted devices.
This issue affects the following versions:
Junos OS:
- All versions before 21.2R3-S8,
- from 21.4 before 21.4R3-S8,
- from 22.2 before 22.2R3-S5,
- from 22.3 before 22.3R3-S4,
- from 22.4 before 22.4R3-S4,
- from 23.2 before 23.2R2-S1,
- from 23.4 before 23.4R1-S2, 23.4R2,
- from 24.2 before 24.2R2-EVO.
Junos OS Evolved:
- All versions before 21.2R3-S8-EVO,
- from 21.4 before 21.4R3-S8-EVO,
- from 22.2 before 22.2R3-S5-EVO,
- from 22.3 before 22.3R3-S4-EVO,
- from 22.4 before 22.4R3-S4-EVO,
- from 23.2 before 23.2R2-S1-EVO,
- from 23.4 before 23.4R1-S2, 23.4R2,
- from 24.2 before 24.2R2-EVO.
The following software releases have been updated to resolve this specific issue:
Junos OS: 21.2R3-S8, 21.4R3-S8, 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S4, 23.2R2-S1, 23.4R1-S2, 23.4R2, 24.2R1, and all subsequent releases.
Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S5-EVO*, 22.3R3-S4-EVO*, 22.4R3-S4-EVO, 23.2R2-S1-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 24.2R1-EVO and all subsequent releases.

Blogger at www.systemtek.co.uk