Lucene search

K
vulnrichmentJuniperVULNRICHMENT:CVE-2024-30378
HistoryApr 16, 2024 - 8:03 p.m.

CVE-2024-30378 Junos OS: MX Series: bbe-smgd process crash upon execution of specific CLI commands

2024-04-1620:03:56
CWE-416
juniper
github.com
5
juniper networks
command processing
dos
gres
subscriber management

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS4

6.9

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

A Use After Free vulnerability in command processing of Juniper Networks Junos OS on MX Series allows a local, authenticated attacker to cause the broadband edge service manager daemon (bbe-smgd) to crash upon execution of specific CLI commands, creating a Denial of Service (DoS) condition.Β  The process crashes and restarts automatically.

When specific CLI commands are executed, the bbe-smgd daemon attempts to write into an area of memory (mgd socket) that was already closed, causing the process to crash.Β  This process manages and controls the configuration of broadband subscriber sessions and services.Β  While the process is unavailable, additional subscribers will not be able to connect to the device, causing a temporary Denial of Service condition.

This issue only occurs ifΒ Graceful Routing Engine Switchover (GRES) and Subscriber Management are enabled.
This issue affects Junos OS:

  • All versions before 20.4R3-S5,
  • from 21.1 before 21.1R3-S4,
  • from 21.2 before 21.2R3-S3,
  • from 21.3 before 21.3R3-S5,
  • from 21.4 before 21.4R3-S5,
  • from 22.1 before 22.1R3,
  • from 22.2 before 22.2R3,
  • from 22.3 before 22.3R2;

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "21.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "21.2"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "21.3"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "21.4"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "22.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "22.2"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "22.3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS4

6.9

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

AI Score

7.2

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-30378