First published: Tue Apr 16 2024(Updated: )
A Use After Free vulnerability in command processing of Juniper Networks Junos OS on MX Series allows a local, authenticated attacker to cause the broadband edge service manager daemon (bbe-smgd) to crash upon execution of specific CLI commands, creating a Denial of Service (DoS) condition. The process crashes and restarts automatically. When specific CLI commands are executed, the bbe-smgd daemon attempts to write into an area of memory (mgd socket) that was already closed, causing the process to crash. This process manages and controls the configuration of broadband subscriber sessions and services. While the process is unavailable, additional subscribers will not be able to connect to the device, causing a temporary Denial of Service condition. This issue only occurs if Graceful Routing Engine Switchover (GRES) and Subscriber Management are enabled. This issue affects Junos OS: * All versions before 20.4R3-S5, * from 21.1 before 21.1R3-S4, * from 21.2 before 21.2R3-S3, * from 21.3 before 21.3R3-S5, * from 21.4 before 21.4R3-S5, * from 22.1 before 22.1R3, * from 22.2 before 22.2R3, * from 22.3 before 22.3R2;
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Junos OS Evolved | <20.4 | |
Junos OS Evolved | =20.4 | |
Junos OS Evolved | =20.4-r1 | |
Junos OS Evolved | =20.4-r1-s1 | |
Junos OS Evolved | =20.4-r2 | |
Junos OS Evolved | =20.4-r2-s1 | |
Junos OS Evolved | =20.4-r2-s2 | |
Junos OS Evolved | =20.4-r3 | |
Junos OS Evolved | =20.4-r3-s1 | |
Junos OS Evolved | =20.4-r3-s2 | |
Junos OS Evolved | =20.4-r3-s3 | |
Junos OS Evolved | =20.4-r3-s4 | |
Junos OS Evolved | =21.1 | |
Junos OS Evolved | =21.1-r1 | |
Junos OS Evolved | =21.1-r1-s1 | |
Junos OS Evolved | =21.1-r2 | |
Junos OS Evolved | =21.1-r2-s1 | |
Junos OS Evolved | =21.1-r2-s2 | |
Junos OS Evolved | =21.1-r3 | |
Junos OS Evolved | =21.1-r3-s1 | |
Junos OS Evolved | =21.1-r3-s2 | |
Junos OS Evolved | =21.1-r3-s3 | |
Junos OS Evolved | =21.2 | |
Junos OS Evolved | =21.2-r1 | |
Junos OS Evolved | =21.2-r1-s1 | |
Junos OS Evolved | =21.2-r1-s2 | |
Junos OS Evolved | =21.2-r2 | |
Junos OS Evolved | =21.2-r2-s1 | |
Junos OS Evolved | =21.2-r2-s2 | |
Junos OS Evolved | =21.2-r3 | |
Junos OS Evolved | =21.2-r3-s1 | |
Junos OS Evolved | =21.2-r3-s2 | |
Junos OS Evolved | =21.3 | |
Junos OS Evolved | =21.3-r1 | |
Junos OS Evolved | =21.3-r1-s1 | |
Junos OS Evolved | =21.3-r1-s2 | |
Junos OS Evolved | =21.3-r2 | |
Junos OS Evolved | =21.3-r2-s1 | |
Junos OS Evolved | =21.3-r2-s2 | |
Junos OS Evolved | =21.3-r3 | |
Junos OS Evolved | =21.3-r3-s1 | |
Junos OS Evolved | =21.3-r3-s2 | |
Junos OS Evolved | =21.3-r3-s3 | |
Junos OS Evolved | =21.3-r3-s4 | |
Junos OS Evolved | =21.4 | |
Junos OS Evolved | =21.4-r1 | |
Junos OS Evolved | =21.4-r1-s1 | |
Junos OS Evolved | =21.4-r1-s2 | |
Junos OS Evolved | =21.4-r2 | |
Junos OS Evolved | =21.4-r2-s1 | |
Junos OS Evolved | =21.4-r2-s2 | |
Junos OS Evolved | =21.4-r3 | |
Junos OS Evolved | =21.4-r3-s1 | |
Junos OS Evolved | =21.4-r3-s2 | |
Junos OS Evolved | =21.4-r3-s3 | |
Junos OS Evolved | =21.4-r3-s4 | |
Junos OS Evolved | =22.1 | |
Junos OS Evolved | =22.1-r1 | |
Junos OS Evolved | =22.1-r1-s1 | |
Junos OS Evolved | =22.1-r1-s2 | |
Junos OS Evolved | =22.1-r2 | |
Junos OS Evolved | =22.1-r2-s1 | |
Junos OS Evolved | =22.1-r2-s2 | |
Junos OS Evolved | =22.2 | |
Junos OS Evolved | =22.2-r1 | |
Junos OS Evolved | =22.2-r1-s1 | |
Junos OS Evolved | =22.2-r1-s2 | |
Junos OS Evolved | =22.2-r2 | |
Junos OS Evolved | =22.2-r2-s1 | |
Junos OS Evolved | =22.2-r2-s2 | |
Junos OS Evolved | =22.3 | |
Junos OS Evolved | =22.3-r1 | |
Junos OS Evolved | =22.3-r1-s1 | |
Junos OS Evolved | =22.3-r1-s2 | |
Any of | ||
Juniper MX Series | ||
Juniper MX10 | ||
Juniper MX10000 | ||
Juniper MX10003 | ||
Juniper MX10004 | ||
Juniper MX10008 | ||
Juniper MX10016 | ||
Juniper MX104 | ||
Juniper MX150 | ||
Juniper MX2008 | ||
Juniper MX2010 | ||
Juniper MX2020 | ||
Juniper MX204 | ||
Juniper MX240 | ||
Juniper MX304 | ||
Juniper MX40 | ||
Juniper MX480 | ||
Juniper MX5 | ||
Juniper MX80 | ||
Juniper MX960 | ||
Juniper JUNOS | <20.4R3-S5>=undefined>=undefined>=undefined>=undefined>=undefined>=undefined>=undefined |
The following software releases have been updated to resolve this specific issue: Junos OS: 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S5, 21.4R3-S5, 22.1R3, 22.2R3, 22.3R2, 22.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30378 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2024-30378, you should upgrade to a non-vulnerable version of Junos OS beyond 20.4R3-S5.
A local, authenticated attacker can exploit CVE-2024-30378.
CVE-2024-30378 affects the broadband edge service manager daemon (bbe-smgd) on Junos OS.
CVE-2024-30378 is a Use After Free vulnerability occurring during command processing.