CVE-2024-21585

CVSS 3.1 Score 5.9 of 10 (medium)

Details

Published Jan 12, 2024
Updated: Jan 31, 2024
CWE ID 755

Summary

CVE-2024-21585 is an Improper Handling of Exceptional Conditions vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved. This issue allows unauthenticated attackers to cause a Denial of Service (DoS) by flapping BGP sessions and crashing the routing protocol daemon (rpd). This vulnerability only impacts routers with Non-Stop Routing (NSR) enabled and Graceful Restart (GR) helper mode. When a BGP session flaps, the router enters a parallel replication state, leading to assertion failures and a sustained DoS condition. Affected versions of Junos OS include all versions earlier than 20.4R3-S9, 21.2 versions earlier than 21.2R3-S7, 21.3 versions earlier than 21.3R3-S5, 21.4 versions earlier than 21.4R3-S5, 22.1 versions earlier than 22.1R3-S4, 22.2 versions earlier than 22.2R3-S3, 22.3 versions earlier than 22.3R3-S1, 22.4 versions earlier than 22.4R2-S2, 22.4R3, 23.2 versions earlier than 23.2R1-S1, and 23.2R2. Affected versions of Junos OS Evolved include all versions earlier than 21.3R3-S5-EVO, 21.4 versions earlier than 21.4R3-S5-EVO, 22.1 versions earlier than 22.1R3-S4-EVO, 22.2 versions earlier than 22.2R3-S3-EVO, 22.3 versions earlier than 22.3R3-S1-EVO, 22.4 versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO, 23.2 versions earlier than 23.2R1-S1-EVO, and 23.2R2-EVO.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Juniper Junos
  • Juniper Junos Os Evolved

Affected Vendors

  • Juniper Networks

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-21585 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions