Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-39554
PUBLISHED
More InfoOfficial Page
Assigner-juniper
Assigner Org ID-8cbe9d5a-a066-4c94-8978-4b15efeae968
View Known Exploited Vulnerability (KEV) details
Published At-10 Jul, 2024 | 22:32
Updated At-02 Aug, 2024 | 04:26
Rejected At-
▼CVE Numbering Authority (CNA)
Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash and restart, resulting in a Denial of Service (DoS). Since this is a timing issue (race condition), the successful exploitation of this vulnerability is outside the attacker's control.  However, continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition. On all Junos OS and Junos OS Evolved platforms with BGP multipath enabled, a specific multipath calculation removes the original next hop from the multipath lead routes nexthop-set. When this change happens, multipath relies on certain internal timing to record the update.  Under certain circumstance and with specific timing, this could result in an rpd crash. This issue only affects systems with BGP multipath enabled. This issue affects: Junos OS: * All versions of 21.1 * from 21.2 before 21.2R3-S7, * from 21.4 before 21.4R3-S6, * from 22.1 before 22.1R3-S5, * from 22.2 before 22.2R3-S3, * from 22.3 before 22.3R3-S2, * from 22.4 before 22.4R3, * from 23.2 before 23.2R2. Junos OS Evolved: * All versions of 21.1-EVO, * All versions of 21.2-EVO, * from 21.4-EVO before 21.4R3-S6-EVO, * from 22.1-EVO before 22.1R3-S5-EVO, * from 22.2-EVO before 22.2R3-S3-EVO, * from 22.3-EVO before 22.3R3-S2-EVO, * from 22.4-EVO before 22.4R3-EVO, * from 23.2-EVO before 23.2R2-EVO. Versions of Junos OS before 21.1R1 are unaffected by this vulnerability. Versions of Junos OS Evolved before 21.1R1-EVO are unaffected by this vulnerability.

Affected Products
Vendor
Juniper Networks, Inc.Juniper Networks
Product
Junos OS
Default Status
unaffected
Versions
Affected
  • From 21.1 before 21.1* (semver)
  • From 21.2 before 21.2R3-S7 (semver)
  • From 21.4 before 21.4R3-S6 (semver)
  • From 22.1 before 22.1R3-S5 (semver)
  • From 22.2 before 22.2R3-S3 (semver)
  • From 22.3 before 22.3R3-S2 (semver)
  • From 22.4 before 22.4R3 (semver)
  • From 23.2 before 23.2R2 (semver)
Unaffected
  • From 0 before 21.1R1 (semver)
Vendor
Juniper Networks, Inc.Juniper Networks
Product
Junos OS Evolved
Default Status
unaffected
Versions
Affected
  • From 21.1-EVO before 21.1*-EVO (semver)
  • From 21.2-EVO before 21.2*-EVO (semver)
  • From 21.4-EVO before 21.4R3-S6-EVO (semver)
  • From 22.1-EVO before 22.1R3-S5-EVO (semver)
  • From 22.2-EVO before 22.2R3-S3-EVO (semver)
  • From 22.3-EVO before 22.3R3-S2-EVO (semver)
  • From 22.4-EVO before 22.4R3-EVO (semver)
  • From 23.2-EVO before 23.2R2-EVO (semver)
Unaffected
  • From 0 before 21.1R1-EVO (semver)
Problem Types
TypeCWE IDDescription
CWECWE-362CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
4.08.2HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases. Junos OS Evolved: 21.4R3-S6-EVO, 22.1R3-S5-EVO, 22.2R3-S3-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.

Configurations

A sample BGP multipath configuration is shown below: [ protocols bgp group <name> multipath ]

Workarounds

There are no known workarounds for this issue.

Exploits

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://supportportal.juniper.net/JSA83014
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Juniper Networks, Inc.juniper
Product
junos
CPEs
  • cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 21.1 before 21.1* (custom)
  • From 21.2 before 21.2r3-s7 (custom)
  • From 21.4 before 21.4r3-s6 (custom)
  • From 22.1 before 22.1r3-s5 (custom)
  • From 22.2 before 22.2r3-s3 (custom)
  • From 22.3 before 22.3r3-s2 (custom)
  • From 22.4 before 22.4r3 (custom)
  • From 23.2 before 23.2r2 (custom)
  • From 0 before 21.1r1 (custom)
Vendor
Juniper Networks, Inc.juniper
Product
junos_os_evolved
CPEs
  • cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 21.1r1-evo (custom)
  • From 21.1-evo before 21.1*-evo (custom)
  • From 21.2-evo before 21.2*-evo (custom)
  • From 21.4-evo before 21.4r3-s6-evo (custom)
  • From 22.1-evo before 22.1r3-s5-evo (custom)
  • From 22.2-evo before 22.2r3-s3-evo (custom)
  • From 22.3-evo before 22.3r3-s2-evo (custom)
  • From 22.4-evo before 22.4r3-evo (custom)
  • From 23.2-evo before 23.2r2-evo (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://supportportal.juniper.net/JSA83014
vendor-advisory
x_transferred
Details not found