First published: Fri Oct 11 2024(Updated: )
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a scenario where BGP Monitoring Protocol (BMP) is configured with rib-in pre-policy monitoring, receiving a BGP update with a specifically malformed AS PATH attribute over an established BGP session, can cause an RPD crash and restart. This issue affects: Junos OS: * All versions before 21.2R3-S8, * 21.4 versions before 21.4R3-S8, * 22.2 versions before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2-S1, * 23.4 versions before 23.4R1-S2, 23.4R2; Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * 21.4 versions before 21.4R3-S8-EVO, * 22.2 versions before 22.2R3-S4-EVO, * 22.3 versions before 22.3R3-S3-EVO, * 22.4 versions before 22.4R3-S2-EVO, * 23.2 versions before 23.2R2-S1-EVO, * 23.4 versions before 23.4R1-S2-EVO, 23.4R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.2R3-S8<21.4R3-S8<22.2R3-S4<22.3R3-S3<22.4R3-S2<23.2R2-S1<23.4R1-S2<23.4R2 | |
Juniper Networks Junos OS | <21.2R3-S8-EVO<21.4R3-S8-EVO<22.2R3-S4-EVO<22.3R3-S3-EVO<22.4R3-S2-EVO<23.2R2-S1-EVO<23.4R1-S2-EVO<23.4R2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO, 22.4R3-S2-EVO, 23.2R2-S1-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases; Junos OS: 21.2R3-S8, 21.4R3-S8, 22.2R3-S4, 22.3R3-S3, 22.4R3-S2, 23.2R2-S1, 23.4R1-S2, 23.4R2, 24.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47499 is classified as a high severity vulnerability due to its potential to cause Denial of Service (DoS) in affected systems.
To fix CVE-2024-47499, update your Juniper Networks Junos OS or Junos OS Evolved to the latest patched version.
CVE-2024-47499 affects various versions of Juniper Networks Junos OS and Junos OS Evolved up to specific releases, including versions 21.2R3-S8 and later.
Yes, CVE-2024-47499 can be exploited by an unauthenticated, network-based attacker, making it particularly concerning.
The implications of CVE-2024-47499 include the potential for a complete Denial of Service, which could disrupt network operations.