// For flags

CVE-2024-39554

Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash

Severity Score

8.2
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the

Routing Protocol Daemon (rpd)

of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash and restart, resulting in a Denial of Service (DoS). Since this is a timing issue (race condition), the successful exploitation of this vulnerability is outside the attacker's control.  However, continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition.

On all Junos OS and Junos OS Evolved platforms with BGP multipath enabled, a specific multipath calculation removes the original next hop from the multipath lead routes nexthop-set. When this change happens, multipath relies on certain internal timing to record the update.  Under certain circumstance and with specific timing, this could result in an rpd crash.

This issue only affects systems with BGP multipath enabled.


This issue affects:

Junos OS:


* All versions of 21.1
* from 21.2 before 21.2R3-S7,
* from 21.4 before 21.4R3-S6,
* from 22.1 before 22.1R3-S5,
* from 22.2 before 22.2R3-S3,
* from 22.3 before 22.3R3-S2,
* from 22.4 before 22.4R3,
* from 23.2 before 23.2R2.




Junos OS Evolved:


* All versions of 21.1-EVO,
* All versions of 21.2-EVO,
* from 21.4-EVO before 21.4R3-S6-EVO,
* from 22.1-EVO before 22.1R3-S5-EVO,
* from 22.2-EVO before 22.2R3-S3-EVO,
* from 22.3-EVO before 22.3R3-S2-EVO,
* from 22.4-EVO before 22.4R3-EVO,
* from 23.2-EVO before 23.2R2-EVO.



Versions of Junos OS before 21.1R1 are unaffected by this vulnerability.
Versions of Junos OS Evolved before 21.1R1-EVO are unaffected by this vulnerability.

Una ejecución concurrente que utiliza un recurso compartido con una vulnerabilidad de sincronización inadecuada ('condición de ejecución'), el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Juniper Networks Junos OS Evolved, permite a un atacante basado en red no autenticado inyectar actualizaciones de enrutamiento incrementales cuando BGP multipath está habilitado, lo que provoca que rpd se bloquee y se reinicie, lo que resulta en una denegación de servicio (DoS). Dado que se trata de una cuestión de tiempo (condición de ejecución), la explotación exitosa de esta vulnerabilidad está fuera del control del atacante. Sin embargo, la recepción y el procesamiento continuo de este paquete pueden crear una condición sostenida de Denegación de Servicio (DoS). En todas las plataformas Junos OS y Junos OS Evolved con rutas múltiples BGP habilitadas, un cálculo de rutas múltiples específico elimina el siguiente salto original de las rutas principales de rutas múltiples nexthop-set. Cuando ocurre este cambio, la ruta múltiple depende de cierta sincronización interna para registrar la actualización. Bajo ciertas circunstancias y con un momento específico, esto podría resultar en una falla del RPD. Este problema solo afecta a los sistemas con rutas múltiples BGP habilitadas. Este problema afecta a: Junos OS: * Todas las versiones de 21.1 * desde 21.2 anterior a 21.2R3-S7, * desde 21.4 anterior a 21.4R3-S6, * desde 22.1 anterior a 22.1R3-S5, * desde 22.2 anterior a 22.2R3-S3, * desde 22.3 antes de 22.3R3-S2, * de 22.4 antes de 22.4R3, * de 23.2 antes de 23.2R2. Junos OS Evolved: * Todas las versiones de 21.1-EVO, * Todas las versiones de 21.2-EVO, * desde 21.4-EVO antes de 21.4R3-S6-EVO, * desde 22.1-EVO antes de 22.1R3-S5-EVO, * desde 22.2- EVO antes de 22.2R3-S3-EVO, * desde 22.3-EVO antes de 22.3R3-S2-EVO, * desde 22.4-EVO antes de 22.4R3-EVO, * desde 23.2-EVO antes de 23.2R2-EVO. Las versiones de Junos OS anteriores a 21.1R1 no se ven afectadas por esta vulnerabilidad. Las versiones de Junos OS evolucionadas anteriores a 21.1R1-EVO no se ven afectadas por esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-06-25 CVE Reserved
  • 2024-07-10 CVE Published
  • 2024-07-11 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 21.1 < 21.1*
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.1 < 21.1*"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 21.2 < 21.2R3-S7
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.2 < 21.2R3-S7"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 21.4 < 21.4R3-S6
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.4 < 21.4R3-S6"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.1 < 22.1R3-S5
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.1 < 22.1R3-S5"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.2 < 22.2R3-S3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2 < 22.2R3-S3"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.3 < 22.3R3-S2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R3-S2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.4 < 22.4R3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R3"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 23.2 < 23.2R2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 23.2 < 23.2R2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 21.1*-EVO < 21.1-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 21.1*-EVO < 21.1-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 21.2*-EVO < 21.2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 21.2*-EVO < 21.2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 21.4-EVO < 21.4R3-S6-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 21.4-EVO < 21.4R3-S6-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.1-EVO < 22.1R3-S5-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.1-EVO < 22.1R3-S5-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.2-EVO < 22.2R3-S3-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.2-EVO < 22.2R3-S3-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.3-EVO < 22.3R3-S2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.3-EVO < 22.3R3-S2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.4-EVO < 22.4R3-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.4-EVO < 22.4R3-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.2-EVO < 23.2R2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.2-EVO < 23.2R2-EVO"
en
Affected