// For flags

CVE-2024-47491

Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash

Severity Score

8.7
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS).

When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts.

Continuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impacted devices.

This issue affects:

 Juniper Networks Junos OS: 



* All versions before 21.4R3-S8, 
* from 22.2 before 22.2R3-S4, 
* from 22.4 before 22.4R3-S3, 
* from 23.2 before 23.2R2-S1, 
* from 23.4 before 23.4R1-S2, 23.4R2.


 Juniper Networks Junos OS Evolved: 

* All versions before 21.4R3-S8-EVO,
* from 22.2 before 22.2R3-S4-EVO,
* from 22.4 before 22.4R3-S3-EVO,
* from 23.2 before 23.2R2-S1-EVO,
* from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS).

When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts.

Continuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impacted devices. While this issue affects systems running 32-bit and 64-bit systems, the probability of impact on 64-bit system is extremely low. 
According to KB25803 https://supportportal.juniper.net/s/article/Junos-How-to-check-if-Junos-OS-is-64-or-32-bit-on-a-router , customers can confirm 32-bit or 64-bit system via the ' show version detail ' command:



     lab@router> show version detail| match 32
     JUNOS 32-bit kernel Software Suite 

     lab@router> show version detail| match 64
     JUNOS 64-bit kernel Software Suite 


This issue affects:

 Juniper Networks Junos OS: 

* All versions before 21.4R3-S8, 
* from 22.2 before 22.2R3-S4, 
* from 22.4 before 22.4R3-S3, 
* from 23.2 before 23.2R2-S1, 
* from 23.4 before 23.4R1-S2, 23.4R2.


 Juniper Networks Junos OS Evolved:  * All versions before 21.4R3-S8-EVO,
* from 22.2 before 22.2R3-S4-EVO,
* from 22.4 before 22.4R3-S3-EVO,
* from 23.2 before 23.2R2-S1-EVO,
* from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Network
Attack Complexity
High
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-09-25 CVE Reserved
  • 2024-10-11 CVE Published
  • 2024-10-12 EPSS Updated
  • 2024-10-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://supportportal.juniper.net 2024-10-11
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
< 21.4R3-S8
Search vendor "Juniper Networks" for product "Junos OS" and version " < 21.4R3-S8"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.2 < 22.2R3-S4
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2 < 22.2R3-S4"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.4 < 22.4R3-S3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R3-S3"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 23.2 < 23.2R2-S1
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 23.2 < 23.2R2-S1"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 23.4 < 23.4R1-S2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 23.4 < 23.4R1-S2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 23.4 < 23.4R2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 23.4 < 23.4R2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
< 21.4R3-S8-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " < 21.4R3-S8-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.2 < 22.2R3-S4-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.2 < 22.2R3-S4-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.4 < 22.4R3-S3-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.4 < 22.4R3-S3-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.2 < 23.2R2-S1-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.2 < 23.2R2-S1-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.4 < 23.4R1-S2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.4 < 23.4R1-S2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.4 < 23.4R2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.4 < 23.4R2-EVO"
en
Affected