Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-39554
Analyzed
More InfoOfficial Page
Source-sirt@juniper.net
View Known Exploited Vulnerability (KEV) details
Published At-10 Jul, 2024 | 23:15
Updated At-07 Feb, 2025 | 20:01

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash and restart, resulting in a Denial of Service (DoS). Since this is a timing issue (race condition), the successful exploitation of this vulnerability is outside the attacker's control.  However, continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition. On all Junos OS and Junos OS Evolved platforms with BGP multipath enabled, a specific multipath calculation removes the original next hop from the multipath lead routes nexthop-set. When this change happens, multipath relies on certain internal timing to record the update.  Under certain circumstance and with specific timing, this could result in an rpd crash. This issue only affects systems with BGP multipath enabled. This issue affects: Junos OS: * All versions of 21.1 * from 21.2 before 21.2R3-S7, * from 21.4 before 21.4R3-S6, * from 22.1 before 22.1R3-S5, * from 22.2 before 22.2R3-S3, * from 22.3 before 22.3R3-S2, * from 22.4 before 22.4R3, * from 23.2 before 23.2R2. Junos OS Evolved: * All versions of 21.1-EVO, * All versions of 21.2-EVO, * from 21.4-EVO before 21.4R3-S6-EVO, * from 22.1-EVO before 22.1R3-S5-EVO, * from 22.2-EVO before 22.2R3-S3-EVO, * from 22.3-EVO before 22.3R3-S2-EVO, * from 22.4-EVO before 22.4R3-EVO, * from 23.2-EVO before 23.2R2-EVO. Versions of Junos OS before 21.1R1 are unaffected by this vulnerability. Versions of Junos OS Evolved before 21.1R1-EVO are unaffected by this vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.2HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Juniper Networks, Inc.
juniper
>>junos>>Versions from 21.1(inclusive) to 21.2(exclusive)
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.2
cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>21.4
cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.1
cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>22.2
cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-362Secondarysirt@juniper.net
CWE-362Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://supportportal.juniper.net/JSA83014sirt@juniper.net
Vendor Advisory
https://supportportal.juniper.net/JSA83014af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found