8.2
CWE
755
Advisory Published
Updated

CVE-2024-47491: Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash

First published: Fri Oct 11 2024(Updated: )

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts. Continuous receipt of a BGP UPDATE with a specifically malformed path attribute will create a sustained Denial of Service (DoS) condition for impacted devices. While this issue affects systems running 32-bit and 64-bit systems, the probability of impact on 64-bit system is extremely low.  According to KB25803 https://supportportal.juniper.net/s/article/Junos-How-to-check-if-Junos-OS-is-64-or-32-bit-on-a-router , customers can confirm 32-bit or 64-bit system via the ' show version detail ' command:      lab@router> show version detail| match 32      JUNOS 32-bit kernel Software Suite       lab@router> show version detail| match 64      JUNOS 64-bit kernel Software Suite  This issue affects:  Juniper Networks Junos OS:  * All versions before 21.4R3-S8,  * from 22.2 before 22.2R3-S4,  * from 22.4 before 22.4R3-S3,  * from 23.2 before 23.2R2-S1,  * from 23.4 before 23.4R1-S2, 23.4R2.  Juniper Networks Junos OS Evolved:  * All versions before 21.4R3-S8-EVO, * from 22.2 before 22.2R3-S4-EVO, * from 22.4 before 22.4R3-S3-EVO, * from 23.2 before 23.2R2-S1-EVO, * from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Junos<21.4R3-S8>=undefined>=undefined>=undefined>=undefined>=23.4R2<23.5
Juniper Networks Junos OS<21.4R3-S8-EVO>=undefined>=undefined>=undefined>=undefined>=23.4R2-EVO<23.5-EVO

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS: 21.4R3-S8, 22.2R3-S4, 22.4R3-S3, 23.2R2-S1, 23.4R1-S2, 23.4R2, 24.2R1, and all subsequent releases. Junos OS Evolved: 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S1-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-47491?

    CVE-2024-47491 has been classified as a critical vulnerability due to its potential to cause Denial of Service.

  • How do I fix CVE-2024-47491?

    To mitigate CVE-2024-47491, users should upgrade their Junos OS or Junos OS Evolved to the latest version that addresses this issue.

  • What types of systems are affected by CVE-2024-47491?

    CVE-2024-47491 affects Juniper Networks Junos OS and Junos OS Evolved versions up to 21.4R3-S8 and specific versions in the 23.x series.

  • Can CVE-2024-47491 be exploited remotely?

    Yes, CVE-2024-47491 can be exploited remotely by unauthenticated attackers via a malformed BGP UPDATE message.

  • What impact does CVE-2024-47491 have on network performance?

    CVE-2024-47491 can lead to a Denial of Service, severely impacting network performance and availability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203