8.7
CWE
755
Advisory Published
Updated

CVE-2024-39552: Junos OS and Junos OS Evolved: Malformed BGP UPDATE causes RPD crash

First published: Thu Jul 11 2024(Updated: )

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, RPD crashes and restarts. Continuous receipt of the malformed BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session. This issue affects: Juniper Networks Junos OS: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R2. Juniper Networks Junos OS Evolved: * All versions earlier than 21.2R3-S7; * 21.3-EVO versions earlier than 21.3R3-S5; * 21.4-EVO versions earlier than 21.4R3-S8; * 22.1-EVO versions earlier than 22.1R3-S4; * 22.2-EVO versions earlier than 22.2R3-S3; * 22.3-EVO versions earlier than 22.3R3-S2; * 22.4-EVO versions earlier than 22.4R3; * 23.2-EVO versions earlier than 23.2R2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Junos<20.4R3-S9<21.2R3-S7<21.3R3-S5<21.4R3-S6<22.1R3-S4<22.2R3-S3<22.3R3-S2<22.4R3<23.2R2
Juniper Networks Junos OS<21.2R3-S7<21.3R3-S5<21.4R3-S8<22.1R3-S4<22.2R3-S3<22.3R3-S2<22.4R3<23.2R2

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases. Junos OS Evolved: 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S8-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-39552?

    CVE-2024-39552 has been categorized as a high severity vulnerability due to its potential to cause Denial of Service (DoS).

  • How do I fix CVE-2024-39552?

    To fix CVE-2024-39552, upgrade to a fixed version of Juniper Networks Junos OS or Junos OS Evolved as specified in the security advisory.

  • What systems are affected by CVE-2024-39552?

    CVE-2024-39552 affects specific versions of both Juniper Networks Junos OS and Junos OS Evolved, including versions up to 23.2R2.

  • Can CVE-2024-39552 be exploited remotely?

    Yes, CVE-2024-39552 can be exploited by a network-based, unauthenticated attacker.

  • What impact does CVE-2024-39552 have on my network?

    Exploitation of CVE-2024-39552 can lead to an unintentional crash of the routing protocol daemon, resulting in Denial of Service for network services.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203