
CVE-2024-39560 – Junos OS and Junos OS Evolved: Memory leak due to RSVP neighbor persistent error leading to kernel crash
https://notcve.org/view.php?id=CVE-2024-39560
10 Jul 2024 — An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS). The kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected. System kernel memory can be monitored through the use of the 'show s... • https://supportportal.juniper.net/JSA83020 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2024-39559 – Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled
https://notcve.org/view.php?id=CVE-2024-39559
10 Jul 2024 — An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication enabled, destined to an accessible port on the device, resulting in a Denial of Service (DoS). The receipt of this packet must occur within a specific timing window outside the attacker's control (i.e., race conditi... • https://supportportal.juniper.net/JSA83019 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVE-2024-39558 – Junos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR
https://notcve.org/view.php?id=CVE-2024-39558
10 Jul 2024 — An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS), when PIM is configured with Multicast-only Fast Reroute (MoFRR). Continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition. This issue is observed on Junos and Ju... • https://supportportal.juniper.net/JSA83018 • CWE-252: Unchecked Return Value •

CVE-2024-39557 – Junos OS Evolved: MAC table changes cause a memory leak
https://notcve.org/view.php?id=CVE-2024-39557
10 Jul 2024 — An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS). Certain MAC table updates cause a small amount of memory to leak. Once memory utilization reaches its limit, the issue will result in a system crash and restart. To identify the issue, execute the CLI command: us... • https://supportportal.juniper.net/JSA83017 • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-39556 – Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow
https://notcve.org/view.php?id=CVE-2024-39556
10 Jul 2024 — A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution. By exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limited to the loca... • https://supportportal.juniper.net/JSA83016 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-39555 – Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP update causes the session to reset
https://notcve.org/view.php?id=CVE-2024-39555
10 Jul 2024 — An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued receipt and processing of these malformed BGP update messages will create a sustained Denial of Service (DoS) condition. Upon receipt of a BGP update message over an established BGP session containing a specifically ... • https://supportportal.juniper.net/JSA83015 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2024-39554 – Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash
https://notcve.org/view.php?id=CVE-2024-39554
10 Jul 2024 — A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash and restart, resulting in a Denial of Service (DoS). Since this is a timing issue (race condition), the successful exploitation of this vulnerability is outside th... • https://supportportal.juniper.net/JSA83014 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2024-30380 – Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV
https://notcve.org/view.php?id=CVE-2024-30380
16 Apr 2024 — An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP, ERP, and LLDP. The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP, leading to a Denial of Service. Conti... • https://supportportal.juniper.net/JSA79171 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2024-30402 – Junos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a specific subscription
https://notcve.org/view.php?id=CVE-2024-30402
12 Apr 2024 — An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When telemetry requests are sent to the device, and the Dynamic Rendering Daemon (drend) is suspended, the l2ald crashes and restarts due to factors outside the attackers control. Repeated occurrences of these events causes a sustained DoS condition. This issue af... • https://supportportal.juniper.net/JSA79180 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVE-2024-30390 – Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced
https://notcve.org/view.php?id=CVE-2024-30390
12 Apr 2024 — An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane. When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded. This issue affects Junos OS Evolved: * All ve... • http://supportportal.juniper.net/JSA79183 • CWE-307: Improper Restriction of Excessive Authentication Attempts •