NewsSecurity Vulnerabilities

Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash (CVE-2024-39549)

CVE number = CVE-2024-39549

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, attacker to cause the RPD process to crash leading to a Denial of Service (DoS).

When a malformed BGP path attributes packet is received over an established BGP session, RPD crashes and restarts.

Continuous receipt of the malformed BGP path attributes messages will create a sustained Denial of Service (DoS) condition for impacted devices.

This issue affects the following versions:

Junos OS: 

  • All versions before 21.2R3-S8, 
  • from 21.4 before 21.4R3-S8,
  • from 22.2 before 22.2R3-S5, 
  • from 22.3 before 22.3R3-S4, 
  • from 22.4 before 22.4R3-S4,
  • from 23.2 before 23.2R2-S1, 
  • from 23.4 before 23.4R1-S2, 23.4R2,
  • from 24.2 before 24.2R2-EVO.

Junos OS Evolved:

  • All versions before 21.2R3-S8-EVO,
  • from 21.4 before 21.4R3-S8-EVO,
  • from 22.2 before 22.2R3-S5-EVO,
  • from 22.3 before 22.3R3-S4-EVO,
  • from 22.4 before 22.4R3-S4-EVO,
  • from 23.2 before 23.2R2-S1-EVO,
  • from 23.4 before 23.4R1-S2, 23.4R2,
  • from 24.2 before 24.2R2-EVO.

The following software releases have been updated to resolve this specific issue:

Junos OS: 21.2R3-S8, 21.4R3-S8, 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S4, 23.2R2-S1, 23.4R1-S2, 23.4R2, 24.2R1, and all subsequent releases.

Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S5-EVO*, 22.3R3-S4-EVO*, 22.4R3-S4-EVO, 23.2R2-S1-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 24.2R1-EVO and all subsequent releases. 

Luke Simmonds

Blogger at www.systemtek.co.uk

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.