First published: Wed Oct 09 2024(Updated: )
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. In some cases, rpd fails to restart requiring a manual restart via the 'restart routing' CLI command. This issue only affects systems with BGP traceoptions enabled and requires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability. This issue affects: Junos OS: * All versions before 21.4R3-S8, * 22.2 before 22.2R3-S5, * 22.3 before 22.3R3-S4, * 22.4 before 22.4R3-S3, * 23.2 before 23.2R2-S2, * 23.4 before 23.4R2; Junos OS Evolved: * All versions before 21.4R3-S8-EVO, * 22.2-EVO before 22.2R3-S5-EVO, * 22.3-EVO before 22.3R3-S4-EVO, * 22.4-EVO before 22.4R3-S3-EVO, * 23.2-EVO before 23.2R2-S2-EVO, * 23.4-EVO before 23.4R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.4R3-S8<22.2R3-S5<22.3R3-S4<22.4R3-S3<23.2R2-S2<23.4R2 | |
Juniper Networks Junos OS | <21.4R3-S8-EVO<22.2R3-S5-EVO<22.3R3-S4-EVO<22.4R3-S3-EVO<23.2R2-S2-EVO<23.4R2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS: 21.4R3-S8, 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S3, 23.2R2-S2, 23.4R2, 24.2R1, and all subsequent releases. Junos OS Evolved: 21.4R3-S8-EVO, 22.2R3-S5-EVO*, 22.3R3-S4-EVO*, 22.4R3-S3-EVO, 23.2R2-S2-EVO, 23.4R2-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.4R1-EVO*, and all subsequent releases. *Future release
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39515 is classified with a high severity due to its potential to cause denial of service.
To mitigate CVE-2024-39515, it is recommended to upgrade to the latest versions of Junos OS and Junos OS Evolved that fix this vulnerability.
CVE-2024-39515 affects Juniper Networks Junos OS and Junos OS Evolved versions up to 21.4R3-S8, and several subsequent versions.
CVE-2024-39515 allows unauthenticated attackers to send malformed BGP packets that may crash the routing protocol daemon.
The impact of CVE-2024-39515 is the crashing and restarting of the routing protocol daemon, leading to potential network outages.