#VU98392 Improper Check or Handling of Exceptional Conditions in Junos OS Evolved and Juniper Junos OS - CVE-2024-39525

 

#VU98392 Improper Check or Handling of Exceptional Conditions in Junos OS Evolved and Juniper Junos OS - CVE-2024-39525

Published: October 11, 2024


Vulnerability identifier: #VU98392
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2024-39525
CWE-ID: CWE-703
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Junos OS Evolved
Juniper Junos OS
Software vendor:
Juniper Networks, Inc.

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of exceptional conditions in the routing protocol daemon (rpd) when BGP nexthop traceoptions is enabled. A remote attacker can send a specific BGP packet to cause rpd to crash and restart.

This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.


Remediation

Install updates from vendor's website.

External links