CWE
122 119 787
EPSS
0.052%
Advisory Published
Updated

CVE-2024-21596: Junos OS and Junos OS Evolved: A specific BGP UPDATE message will cause a crash in the backup Routing Engine in NSR-enabled devices

First published: Fri Jan 12 2024(Updated: )

A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). If an attacker sends a specific BGP UPDATE message to the device, this will cause a memory overwrite and therefore an RPD crash and restart in the backup Routing Engine (RE). Continued receipt of these packets will cause a sustained Denial of Service (DoS) condition in the backup RE. The primary RE is not impacted by this issue and there is no impact on traffic. This issue only affects devices with NSR enabled. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. This issue requires an attacker to have an established BGP session to a system affected by the issue. This issue affects both eBGP and iBGP implementations. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S2; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.1 versions earlier than 23.1R2; * 23.2 versions earlier than 23.2R1-S2, 23.2R2. Juniper Networks Junos OS Evolved * All versions earlier than 21.3R3-S5-EVO; * 21.4-EVO versions earlier than 21.4R3-S5-EVO; * 22.1-EVO versions earlier than 22.1R3-S4-EVO; * 22.2-EVO versions earlier than 22.2R3-S2-EVO; * 22.3-EVO versions later than 22.3R1-EVO; * 22.4-EVO versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO; * 23.1-EVO versions earlier than 23.1R2-EVO; * 23.2-EVO versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
Juniper JUNOS=20.4-r2-s2
Juniper JUNOS=20.4-r3
Juniper JUNOS=20.4-r3-s1
Juniper JUNOS=20.4-r3-s2
Juniper JUNOS=20.4-r3-s3
Juniper JUNOS=20.4-r3-s4
Juniper JUNOS=20.4-r3-s5
Juniper JUNOS=20.4-r3-s6
Juniper JUNOS=20.4-r3-s7
Juniper JUNOS=20.4-r3-s8
Juniper JUNOS=21.2
Juniper JUNOS=21.2-r1
Juniper JUNOS=21.2-r1-s1
Juniper JUNOS=21.2-r1-s2
Juniper JUNOS=21.2-r2
Juniper JUNOS=21.2-r2-s1
Juniper JUNOS=21.2-r2-s2
Juniper JUNOS=21.2-r3
Juniper JUNOS=21.2-r3-s1
Juniper JUNOS=21.2-r3-s2
Juniper JUNOS=21.2-r3-s3
Juniper JUNOS=21.2-r3-s4
Juniper JUNOS=21.2-r3-s5
Juniper JUNOS=21.2-r3-s6
Juniper JUNOS=21.3
Juniper JUNOS=21.3-r1
Juniper JUNOS=21.3-r1-s1
Juniper JUNOS=21.3-r1-s2
Juniper JUNOS=21.3-r2
Juniper JUNOS=21.3-r2-s1
Juniper JUNOS=21.3-r2-s2
Juniper JUNOS=21.3-r3
Juniper JUNOS=21.3-r3-s1
Juniper JUNOS=21.3-r3-s2
Juniper JUNOS=21.3-r3-s3
Juniper JUNOS=21.3-r3-s4
Juniper JUNOS=21.4
Juniper JUNOS=21.4-r1
Juniper JUNOS=21.4-r1-s1
Juniper JUNOS=21.4-r1-s2
Juniper JUNOS=21.4-r2
Juniper JUNOS=21.4-r2-s1
Juniper JUNOS=21.4-r2-s2
Juniper JUNOS=21.4-r3
Juniper JUNOS=21.4-r3-s1
Juniper JUNOS=21.4-r3-s2
Juniper JUNOS=21.4-r3-s3
Juniper JUNOS=21.4-r3-s4
Juniper JUNOS=22.1
Juniper JUNOS=22.1-r1
Juniper JUNOS=22.1-r1-s1
Juniper JUNOS=22.1-r1-s2
Juniper JUNOS=22.1-r2
Juniper JUNOS=22.1-r2-s1
Juniper JUNOS=22.1-r2-s2
Juniper JUNOS=22.1-r3
Juniper JUNOS=22.1-r3-s1
Juniper JUNOS=22.1-r3-s2
Juniper JUNOS=22.1-r3-s3
Juniper JUNOS=22.2
Juniper JUNOS=22.2-r1
Juniper JUNOS=22.2-r1-s1
Juniper JUNOS=22.2-r1-s2
Juniper JUNOS=22.2-r2
Juniper JUNOS=22.2-r2-s1
Juniper JUNOS=22.2-r2-s2
Juniper JUNOS=22.2-r3
Juniper JUNOS=22.2-r3-s1
Juniper JUNOS=22.3
Juniper JUNOS=22.3-r1
Juniper JUNOS=22.3-r1-s1
Juniper JUNOS=22.3-r1-s2
Juniper JUNOS=22.3-r2
Juniper JUNOS=22.3-r2-s1
Juniper JUNOS=22.3-r2-s2
Juniper JUNOS=22.3-r3
Juniper JUNOS=22.4
Juniper JUNOS=22.4-r1
Juniper JUNOS=22.4-r1-s1
Juniper JUNOS=22.4-r1-s2
Juniper JUNOS=22.4-r2
Juniper JUNOS=22.4-r2-s1
Juniper JUNOS=23.1
Juniper JUNOS=23.1-r1
Juniper JUNOS=23.2
Juniper JUNOS=23.2-r1
Juniper JUNOS=23.2-r1-s1
Juniper Networks Junos OS Evolved=21.3
Juniper Networks Junos OS Evolved=21.3-r1
Juniper Networks Junos OS Evolved=21.3-r1-s1
Juniper Networks Junos OS Evolved=21.3-r2
Juniper Networks Junos OS Evolved=21.3-r2-s1
Juniper Networks Junos OS Evolved=21.3-r2-s2
Juniper Networks Junos OS Evolved=21.3-r3
Juniper Networks Junos OS Evolved=21.3-r3-s1
Juniper Networks Junos OS Evolved=21.3-r3-s2
Juniper Networks Junos OS Evolved=21.3-r3-s3
Juniper Networks Junos OS Evolved=21.3-r3-s4
Juniper Networks Junos OS Evolved=21.4
Juniper Networks Junos OS Evolved=21.4-r1
Juniper Networks Junos OS Evolved=21.4-r1-s1
Juniper Networks Junos OS Evolved=21.4-r1-s2
Juniper Networks Junos OS Evolved=21.4-r2
Juniper Networks Junos OS Evolved=21.4-r2-s1
Juniper Networks Junos OS Evolved=21.4-r2-s2
Juniper Networks Junos OS Evolved=21.4-r3
Juniper Networks Junos OS Evolved=21.4-r3-s1
Juniper Networks Junos OS Evolved=21.4-r3-s2
Juniper Networks Junos OS Evolved=21.4-r3-s3
Juniper Networks Junos OS Evolved=21.4-r3-s4
Juniper Networks Junos OS Evolved=22.1
Juniper Networks Junos OS Evolved=22.1-r1
Juniper Networks Junos OS Evolved=22.1-r1-s1
Juniper Networks Junos OS Evolved=22.1-r1-s2
Juniper Networks Junos OS Evolved=22.1-r2
Juniper Networks Junos OS Evolved=22.1-r2-s1
Juniper Networks Junos OS Evolved=22.1-r3
Juniper Networks Junos OS Evolved=22.1-r3-s1
Juniper Networks Junos OS Evolved=22.1-r3-s2
Juniper Networks Junos OS Evolved=22.1-r3-s3
Juniper Networks Junos OS Evolved=22.2
Juniper Networks Junos OS Evolved=22.2-r1
Juniper Networks Junos OS Evolved=22.2-r1-s1
Juniper Networks Junos OS Evolved=22.2-r2
Juniper Networks Junos OS Evolved=22.2-r2-s1
Juniper Networks Junos OS Evolved=22.2-r2-s2
Juniper Networks Junos OS Evolved=22.2-r3
Juniper Networks Junos OS Evolved=22.2-r3-s1
Juniper Networks Junos OS Evolved=22.3-r1-s1
Juniper Networks Junos OS Evolved=22.3-r1-s2
Juniper Networks Junos OS Evolved=22.3-r2
Juniper Networks Junos OS Evolved=22.3-r2-s1
Juniper Networks Junos OS Evolved=22.3-r2-s2
Juniper Networks Junos OS Evolved=22.3-r3
Juniper Networks Junos OS Evolved=22.3-r3-s1
Juniper Networks Junos OS Evolved=22.3-r3-s2
Juniper Networks Junos OS Evolved=22.4
Juniper Networks Junos OS Evolved=22.4-r1
Juniper Networks Junos OS Evolved=22.4-r1-s1
Juniper Networks Junos OS Evolved=22.4-r1-s2
Juniper Networks Junos OS Evolved=22.4-r2
Juniper Networks Junos OS Evolved=22.4-r2-s1
Juniper Networks Junos OS Evolved=23.1
Juniper Networks Junos OS Evolved=23.1-r1
Juniper Networks Junos OS Evolved=23.2
Juniper Networks Junos OS Evolved=23.2-r1
Juniper Networks Junos OS Evolved=23.2-r1-s1

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.1R2, 23.2R1-S2, 23.2R2, 23.3R1, 23.4R1, and all subsequent releases. Junos OS Evolved: 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO, 23.4R1-EVO, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-21596?

    CVE-2024-21596 has been rated with a CVSS base score indicating a significant impact due to a heap-based buffer overflow vulnerability.

  • How do I fix CVE-2024-21596?

    To remediate CVE-2024-21596, upgrade your Junos OS to the version specified in the vendor's advisory associated with this vulnerability.

  • What is the nature of the attack for CVE-2024-21596?

    CVE-2024-21596 allows an unauthenticated network-based attacker to exploit a heap-based buffer overflow via a specific BGP UPDATE message.

  • Which versions of Junos OS are affected by CVE-2024-21596?

    CVE-2024-21596 affects multiple versions of Junos OS including 20.4, 21.2, 21.3, 21.4, and various iterations of Junos OS Evolved.

  • What impact does CVE-2024-21596 have on systems?

    The impact of CVE-2024-21596 includes the potential to cause a Denial of Service (DoS) on affected Juniper Networks devices.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203