First published: Fri Jan 12 2024(Updated: )
An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS * 22.2 versions earlier than 22.2R2-S2, 22.2R3; * 22.3 versions earlier than 22.3R2, 22.3R3. Juniper Networks Junos OS Evolved * 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO; * 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO. This issue does not affect Juniper Networks: Junos OS versions earlier than 22.2R1; Junos OS Evolved versions earlier than 22.2R1-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =22.2 | |
Juniper JUNOS | =22.2-r1 | |
Juniper JUNOS | =22.2-r1-s1 | |
Juniper JUNOS | =22.2-r1-s2 | |
Juniper JUNOS | =22.2-r2 | |
Juniper JUNOS | =22.2-r2-s1 | |
Juniper JUNOS | =22.3 | |
Juniper JUNOS | =22.3-r1 | |
Juniper JUNOS | =22.3-r1-s1 | |
Juniper JUNOS | =22.3-r1-s2 | |
Juniper Networks Junos OS Evolved | =22.2 | |
Juniper Networks Junos OS Evolved | =22.2-r1 | |
Juniper Networks Junos OS Evolved | =22.2-r1-s1 | |
Juniper Networks Junos OS Evolved | =22.2-r2 | |
Juniper Networks Junos OS Evolved | =22.2-r2-s1 | |
Juniper Networks Junos OS Evolved | =22.3 | |
Juniper Networks Junos OS Evolved | =22.3-r1 | |
Juniper Networks Junos OS Evolved | =22.3-r1-s1 | |
Juniper Networks Junos OS Evolved | =22.3-r1-s2 |
The following software releases have been updated to resolve this specific issue. Junos OS: 22.2R2-S2, 22.2R3, 22.3R2, 22.3R3, 22.4R1, and all subsequent releases. Junos OS Evolved: 22.2R2-S2-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.