First published: Fri Jan 12 2024(Updated: )
An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS * 22.2 versions earlier than 22.2R2-S2, 22.2R3; * 22.3 versions earlier than 22.3R2, 22.3R3. Juniper Networks Junos OS Evolved * 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO; * 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO. This issue does not affect Juniper Networks: Junos OS versions earlier than 22.2R1; Junos OS Evolved versions earlier than 22.2R1-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =22.2 | |
Juniper JUNOS | =22.2-r1 | |
Juniper JUNOS | =22.2-r1-s1 | |
Juniper JUNOS | =22.2-r1-s2 | |
Juniper JUNOS | =22.2-r2 | |
Juniper JUNOS | =22.2-r2-s1 | |
Juniper JUNOS | =22.3 | |
Juniper JUNOS | =22.3-r1 | |
Juniper JUNOS | =22.3-r1-s1 | |
Juniper JUNOS | =22.3-r1-s2 | |
Juniper Networks Junos OS Evolved | =22.2 | |
Juniper Networks Junos OS Evolved | =22.2-r1 | |
Juniper Networks Junos OS Evolved | =22.2-r1-s1 | |
Juniper Networks Junos OS Evolved | =22.2-r2 | |
Juniper Networks Junos OS Evolved | =22.2-r2-s1 | |
Juniper Networks Junos OS Evolved | =22.3 | |
Juniper Networks Junos OS Evolved | =22.3-r1 | |
Juniper Networks Junos OS Evolved | =22.3-r1-s1 | |
Juniper Networks Junos OS Evolved | =22.3-r1-s2 |
The following software releases have been updated to resolve this specific issue. Junos OS: 22.2R2-S2, 22.2R3, 22.3R2, 22.3R3, 22.4R1, and all subsequent releases. Junos OS Evolved: 22.2R2-S2-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21614 has been classified with a high severity as it can lead to a Denial of Service (DoS) by crashing the Routing Protocol Daemon.
To fix CVE-2024-21614, update your Junos OS or Junos OS Evolved to the latest patched version provided by Juniper Networks.
CVE-2024-21614 affects Junos OS and Junos OS Evolved versions 22.2 and 22.3.
CVE-2024-21614 allows unauthenticated attackers to crash the Routing Protocol Daemon, resulting in potential network downtime.
CVE-2024-21614 is related to network-based Denial of Service attacks targeting the Routing Protocol Daemon in affected systems.