CVE-2024-21585
CVSS 3.1 Score 5.9 of 10 (medium)
Details
Summary
CVE-2024-21585 is an Improper Handling of Exceptional Conditions vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved. This issue allows unauthenticated attackers to cause a Denial of Service (DoS) by flapping BGP sessions and crashing the routing protocol daemon (rpd). This vulnerability only impacts routers with Non-Stop Routing (NSR) enabled and Graceful Restart (GR) helper mode. When a BGP session flaps, the router enters a parallel replication state, leading to assertion failures and a sustained DoS condition. Affected versions of Junos OS include all versions earlier than 20.4R3-S9, 21.2 versions earlier than 21.2R3-S7, 21.3 versions earlier than 21.3R3-S5, 21.4 versions earlier than 21.4R3-S5, 22.1 versions earlier than 22.1R3-S4, 22.2 versions earlier than 22.2R3-S3, 22.3 versions earlier than 22.3R3-S1, 22.4 versions earlier than 22.4R2-S2, 22.4R3, 23.2 versions earlier than 23.2R1-S1, and 23.2R2. Affected versions of Junos OS Evolved include all versions earlier than 21.3R3-S5-EVO, 21.4 versions earlier than 21.4R3-S5-EVO, 22.1 versions earlier than 22.1R3-S4-EVO, 22.2 versions earlier than 22.2R3-S3-EVO, 22.3 versions earlier than 22.3R3-S1-EVO, 22.4 versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO, 23.2 versions earlier than 23.2R1-S1-EVO, and 23.2R2-EVO.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Juniper Junos
- Juniper Junos Os Evolved
Affected Vendors
- Juniper Networks
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions