Lucene search

K
cveJuniperCVE-2024-39549
HistoryJul 11, 2024 - 5:15 p.m.

CVE-2024-39549

2024-07-1117:15:15
CWE-401
juniper
web.nvd.nist.gov
29
memory release vulnerability
dos
juniper networks junos os
junos os evolved
rpd
bgp path
vulnerability
version affected
manual restart.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L/R:U

EPSS

0.001

Percentile

17.3%

A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not properly freed in all circumstances, leading to a Denial of Service (DoS).

Consumed memory can be freed by manually restarting Routing Protocol Daemon (rpd).

Memory utilization could be monitored by: 
user@host> show system memory or show system monitor memory status

This issue affects:

Junos OS:  * All versions before 21.2R3-S8,

  • from 21.4 before 21.4R3-S8,

  • from 22.2 before 22.2R3-S4,

  • from 22.3 before 22.3R3-S3,

  • from 22.4 before 22.4R3-S3,

  • from 23.2 before 23.2R2-S1,

  • from 23.4 before 23.4R1-S2, 23.4R2,

  • from 24.2 before 24.2R2-EVO.

Junos OS Evolved:

  • All versions before 21.2R3-S8-EVO,

  • from 21.4 before 21.4R3-S8-EVO,

  • from 22.2 before 22.2R3-S4-EVO,

  • from 22.3 before 22.3R3-S3-EVO,

  • from 22.4 before 22.4R3-S3-EVO,

  • from 23.2 before 23.2R2-S1-EVO,

  • from 23.4 before 23.4R1-S2, 23.4R2,

  • from 24.2 before 24.2R2-EVO.

Affected configurations

Nvd
Node
juniperjunosRange21.1
OR
juniperjunosMatch21.2-
OR
juniperjunosMatch21.2r1
OR
juniperjunosMatch21.2r1-s1
OR
juniperjunosMatch21.2r1-s2
OR
juniperjunosMatch21.2r2
OR
juniperjunosMatch21.2r2-s1
OR
juniperjunosMatch21.2r2-s2
OR
juniperjunosMatch21.2r3
OR
juniperjunosMatch21.2r3-s1
OR
juniperjunosMatch21.2r3-s2
OR
juniperjunosMatch21.2r3-s3
OR
juniperjunosMatch21.2r3-s4
OR
juniperjunosMatch21.2r3-s5
OR
juniperjunosMatch21.2r3-s6
OR
juniperjunosMatch21.2r3-s7
OR
juniperjunosMatch21.4-
OR
juniperjunosMatch21.4r1
OR
juniperjunosMatch21.4r1-s1
OR
juniperjunosMatch21.4r1-s2
OR
juniperjunosMatch21.4r2
OR
juniperjunosMatch21.4r2-s1
OR
juniperjunosMatch21.4r2-s2
OR
juniperjunosMatch21.4r3
OR
juniperjunosMatch21.4r3-s1
OR
juniperjunosMatch21.4r3-s2
OR
juniperjunosMatch21.4r3-s3
OR
juniperjunosMatch21.4r3-s4
OR
juniperjunosMatch21.4r3-s5
OR
juniperjunosMatch21.4r3-s6
OR
juniperjunosMatch21.4r3-s7
OR
juniperjunosMatch22.2-
OR
juniperjunosMatch22.2r1
OR
juniperjunosMatch22.2r1-s1
OR
juniperjunosMatch22.2r1-s2
OR
juniperjunosMatch22.2r2
OR
juniperjunosMatch22.2r2-s1
OR
juniperjunosMatch22.2r2-s2
OR
juniperjunosMatch22.2r3
OR
juniperjunosMatch22.2r3-s1
OR
juniperjunosMatch22.2r3-s2
OR
juniperjunosMatch22.2r3-s3
OR
juniperjunosMatch22.3-
OR
juniperjunosMatch22.3r1
OR
juniperjunosMatch22.3r1-s1
OR
juniperjunosMatch22.3r1-s2
OR
juniperjunosMatch22.3r2
OR
juniperjunosMatch22.3r2-s1
OR
juniperjunosMatch22.3r2-s2
OR
juniperjunosMatch22.3r3
OR
juniperjunosMatch22.3r3-s1
OR
juniperjunosMatch22.3r3-s2
OR
juniperjunosMatch22.4-
OR
juniperjunosMatch22.4r1
OR
juniperjunosMatch22.4r1-s1
OR
juniperjunosMatch22.4r1-s2
OR
juniperjunosMatch22.4r2
OR
juniperjunosMatch22.4r2-s1
OR
juniperjunosMatch22.4r2-s2
OR
juniperjunosMatch22.4r3
OR
juniperjunosMatch22.4r3-s1
OR
juniperjunosMatch22.4r3-s2
OR
juniperjunosMatch23.2-
OR
juniperjunosMatch23.2r1
OR
juniperjunosMatch23.2r1-s1
OR
juniperjunosMatch23.2r1-s2
OR
juniperjunosMatch23.2r2
OR
juniperjunosMatch23.4-
OR
juniperjunosMatch23.4r1
OR
juniperjunosMatch23.4r1-s1
OR
juniperjunosMatch24.2-
OR
juniperjunosMatch24.2r1
Node
juniperjunos_os_evolvedRange21.1
OR
juniperjunos_os_evolvedMatch21.2-
OR
juniperjunos_os_evolvedMatch21.2r1
OR
juniperjunos_os_evolvedMatch21.2r1-s1
OR
juniperjunos_os_evolvedMatch21.2r1-s2
OR
juniperjunos_os_evolvedMatch21.2r2
OR
juniperjunos_os_evolvedMatch21.2r2-s1
OR
juniperjunos_os_evolvedMatch21.2r2-s2
OR
juniperjunos_os_evolvedMatch21.2r3
OR
juniperjunos_os_evolvedMatch21.2r3-s1
OR
juniperjunos_os_evolvedMatch21.2r3-s2
OR
juniperjunos_os_evolvedMatch21.2r3-s3
OR
juniperjunos_os_evolvedMatch21.2r3-s4
OR
juniperjunos_os_evolvedMatch21.2r3-s5
OR
juniperjunos_os_evolvedMatch21.2r3-s6
OR
juniperjunos_os_evolvedMatch21.2r3-s7
OR
juniperjunos_os_evolvedMatch21.4-
OR
juniperjunos_os_evolvedMatch21.4r1
OR
juniperjunos_os_evolvedMatch21.4r1-s1
OR
juniperjunos_os_evolvedMatch21.4r1-s2
OR
juniperjunos_os_evolvedMatch21.4r2
OR
juniperjunos_os_evolvedMatch21.4r2-s1
OR
juniperjunos_os_evolvedMatch21.4r2-s2
OR
juniperjunos_os_evolvedMatch21.4r3
OR
juniperjunos_os_evolvedMatch21.4r3-s1
OR
juniperjunos_os_evolvedMatch21.4r3-s2
OR
juniperjunos_os_evolvedMatch21.4r3-s3
OR
juniperjunos_os_evolvedMatch21.4r3-s4
OR
juniperjunos_os_evolvedMatch21.4r3-s5
OR
juniperjunos_os_evolvedMatch21.4r3-s6
OR
juniperjunos_os_evolvedMatch21.4r3-s7
OR
juniperjunos_os_evolvedMatch22.2-
OR
juniperjunos_os_evolvedMatch22.2r1
OR
juniperjunos_os_evolvedMatch22.2r1-s1
OR
juniperjunos_os_evolvedMatch22.2r1-s2
OR
juniperjunos_os_evolvedMatch22.2r2
OR
juniperjunos_os_evolvedMatch22.2r2-s1
OR
juniperjunos_os_evolvedMatch22.2r2-s2
OR
juniperjunos_os_evolvedMatch22.2r3
OR
juniperjunos_os_evolvedMatch22.2r3-s1
OR
juniperjunos_os_evolvedMatch22.2r3-s2
OR
juniperjunos_os_evolvedMatch22.2r3-s3
OR
juniperjunos_os_evolvedMatch22.3-
OR
juniperjunos_os_evolvedMatch22.3r1
OR
juniperjunos_os_evolvedMatch22.3r1-s1
OR
juniperjunos_os_evolvedMatch22.3r1-s2
OR
juniperjunos_os_evolvedMatch22.3r2
OR
juniperjunos_os_evolvedMatch22.3r2-s1
OR
juniperjunos_os_evolvedMatch22.3r2-s2
OR
juniperjunos_os_evolvedMatch22.3r3
OR
juniperjunos_os_evolvedMatch22.3r3-s1
OR
juniperjunos_os_evolvedMatch22.3r3-s2
OR
juniperjunos_os_evolvedMatch22.4-
OR
juniperjunos_os_evolvedMatch22.4r1
OR
juniperjunos_os_evolvedMatch22.4r1-s1
OR
juniperjunos_os_evolvedMatch22.4r1-s2
OR
juniperjunos_os_evolvedMatch22.4r2
OR
juniperjunos_os_evolvedMatch22.4r2-s1
OR
juniperjunos_os_evolvedMatch22.4r2-s2
OR
juniperjunos_os_evolvedMatch22.4r3
OR
juniperjunos_os_evolvedMatch22.4r3-s1
OR
juniperjunos_os_evolvedMatch22.4r3-s2
OR
juniperjunos_os_evolvedMatch23.2-
OR
juniperjunos_os_evolvedMatch23.2r1
OR
juniperjunos_os_evolvedMatch23.2r1-s1
OR
juniperjunos_os_evolvedMatch23.2r1-s2
OR
juniperjunos_os_evolvedMatch23.2r2
OR
juniperjunos_os_evolvedMatch23.4-
OR
juniperjunos_os_evolvedMatch23.4r1
OR
juniperjunos_os_evolvedMatch23.4r1-s1
OR
juniperjunos_os_evolvedMatch24.2-
OR
juniperjunos_os_evolvedMatch24.2r1
VendorProductVersionCPE
juniperjunos*cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
Rows per page:
1-10 of 1441

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "21.2R3-S8",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4R3-S8",
        "status": "affected",
        "version": "21.4",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3-S4",
        "status": "affected",
        "version": "22.2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R3-S3",
        "status": "affected",
        "version": "22.3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R3-S3",
        "status": "affected",
        "version": "22.4",
        "versionType": "semver"
      },
      {
        "lessThan": "23.2R2-S1",
        "status": "affected",
        "version": "23.2",
        "versionType": "semver"
      },
      {
        "lessThan": "23.4R1-S2, 23.4R2",
        "status": "affected",
        "version": "23.4",
        "versionType": "semver"
      },
      {
        "lessThan": "24.2R2",
        "status": "affected",
        "version": "24.2",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS Evolved",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "21.2R3-S8-EVO",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4R3-S8-EVO",
        "status": "affected",
        "version": "21.4",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3-S4-EVO",
        "status": "affected",
        "version": "22.2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R3-S3-EVO",
        "status": "affected",
        "version": "22.3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R3-S3-EVO",
        "status": "affected",
        "version": "22.4",
        "versionType": "semver"
      },
      {
        "lessThan": "23.2R2-S1-EVO",
        "status": "affected",
        "version": "23.2",
        "versionType": "semver"
      },
      {
        "lessThan": "23.4R1-S2-EVO, 23.4R2-EVO",
        "status": "affected",
        "version": "23.4",
        "versionType": "semver"
      },
      {
        "lessThan": "24.2R2-EVO",
        "status": "affected",
        "version": "24.2",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L/R:U

EPSS

0.001

Percentile

17.3%

Related for CVE-2024-39549