// For flags

CVE-2024-21618

Junos OS and Junos OS Evolved: When LLDP is enabled and a malformed LLDP packet is received, l2cpd crashes

Severity Score

7.1
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause Denial of Service (DoS).

On all Junos OS and Junos OS Evolved platforms, when LLDP is enabled on a specific interface, and a malformed LLDP packet is received, l2cpd crashes and restarts. The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP. Also, if any services depend on LLDP state (like PoE or VoIP device recognition), then these will also be affected.

This issue affects:

Junos OS:
* from 21.4 before 21.4R3-S4, 

* from 22.1 before 22.1R3-S4, 

* from 22.2 before 22.2R3-S2, 

* from 22.3 before 22.3R2-S2, 22.3R3-S1, 

* from 22.4 before 22.4R3, 

* from 23.2 before 23.2R2.




Junos OS Evolved:
* from 21.4-EVO before 21.4R3-S5-EVO, 

* from 22.1-EVO before 22.1R3-S4-EVO, 

* from 22.2-EVO before 22.2R3-S2-EVO, 

* from 22.3-EVO before 22.3R2-S2-EVO, 22.3R3-S1-EVO, 

* from 22.4-EVO before 22.4R3-EVO, 

* from 23.2-EVO before 23.2R2-EVO.




This issue does not affect:
* Junos OS versions prior to 21.4R1;

* Junos OS Evolved versions prior to 21.4R1-EVO.

Una vulnerabilidad de acceso a la ubicación de la memoria después del fin del búfer en el daemon de protocolos de control de capa 2 (l2cpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). En todas las plataformas Junos OS y Junos OS Evolved, cuando LLDP está habilitado en una interfaz específica y se recibe un paquete LLDP con formato incorrecto, l2cpd falla y se reinicia. El impacto del fallo de l2cpd es la reinicialización de los protocolos STP (RSTP, MSTP o VSTP) y MVRP y ERP. Además, si algún servicio depende del estado de LLDP (como PoE o reconocimiento de dispositivo VoIP), también se verá afectado. Este problema afecta a: Junos OS: * desde 21.4 anterior a 21.4R3-S4, * desde 22.1 anterior a 22.1R3-S4, * desde 22.2 anterior a 22.2R3-S2, * desde 22.3 anterior a 22.3R2-S2, 22.3R3-S1, * desde 22.4 antes de 22.4R3, * de 23.2 antes de 23.2R2. Junos OS Evolved: * desde 21.4-EVO antes de 21.4R3-S5-EVO, * desde 22.1-EVO antes de 22.1R3-S4-EVO, * desde 22.2-EVO antes de 22.2R3-S2-EVO, * desde 22.3-EVO antes de 22.3 R2-S2-EVO, 22.3R3-S1-EVO, *de 22.4-EVO antes de 22.4R3-EVO, *de 23.2-EVO antes de 23.2R2-EVO. Este problema no afecta: * Versiones de Junos OS anteriores a 21.4R1; * Versiones de Junos OS Evolved anteriores a 21.4R1-EVO.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-12-27 CVE Reserved
  • 2024-04-12 CVE Published
  • 2024-04-21 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-788: Access of Memory Location After End of Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 21.4 < 21.4R3-S4
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.4 < 21.4R3-S4"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.1 < 22.1R3-S4
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.1 < 22.1R3-S4"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.2 < 22.2R3-S2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2 < 22.2R3-S2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.3 < 22.3R2-S2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R2-S2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.3 < 22.3R3-S1
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R3-S1"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.4 < 22.4R3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R3"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 23.2 < 23.2R2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 23.2 < 23.2R2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 21.4-EVO < 21.4R3-S5-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 21.4-EVO < 21.4R3-S5-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.1-EVO < 22.1R3-S4-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.1-EVO < 22.1R3-S4-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.2-EVO < 22.2R3-S2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.2-EVO < 22.2R3-S2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.3-EVO < 22.3R2-S2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.3-EVO < 22.3R2-S2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.3-EVO < 22.3R3-S1-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.3-EVO < 22.3R3-S1-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.4-EVO < 22.4R3-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.4-EVO < 22.4R3-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.2-EVO < 23.2R2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.2-EVO < 23.2R2-EVO"
en
Affected