Lucene search

K
nvd[email protected]NVD:CVE-2024-30382
HistoryApr 12, 2024 - 4:15 p.m.

CVE-2024-30382

2024-04-1216:15:37
CWE-755
web.nvd.nist.gov
1
juniper networks
junos os
junos os evolved
routing protocol daemon
dos
vulnerability
unauthenticated attacker
memory corruption
cos-based forwarding
cve-2024-30382

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.0%

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS).

This issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below).
This issue affects:
Junos OS:

  • all versions before 20.4R3-S10,
  • from 21.2 before 21.2R3-S8,
  • from 21.3 before 21.3R3,
  • from 21.4 before 21.4R3,
  • from 22.1 before 22.1R2;

Junos OS Evolved:

  • all versions before 21.2R3-S8-EVO,
  • from 21.3 before 21.3R3-EVO,
  • from 21.4 before 21.4R3-EVO,
  • from 22.1 before 22.1R2-EVO.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.0%

Related for NVD:CVE-2024-30382