Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash
Description
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.
Continued session establishment failures leads to a sustained DoS condition.
This issue affects Junos OS:
- All versions before 22.2R3-S6,
- from 22.4 before 22.4R3-S6,
- from 23.2 before 23.2R2-S3,
- from 23.4 before 23.4R2-S4,
- from 24.2 before 24.2R2;
Junos OS Evolved: * All versions before 22.2R3-S6-EVO, * from 22.4 before 22.4R3-S6-EVO, * from 23.2 before 23.2R2-S3-EVO, * from 23.4 before 23.4R2-S4-EVO, * from 24.2 before 24.2R2-EVO.
Affected products
3<22.2R3-S6-EVO, >=22.4 <22.4R3-S6-EVO, >=23.2 <23.2R2-S3-EVO, >=23.4 <23.4R2-S4-EVO, >=24.2 <24.2R2-EVO+ 1 more
- (no CPE)range: <22.2R3-S6-EVO, >=22.4 <22.4R3-S6-EVO, >=23.2 <23.2R2-S3-EVO, >=23.4 <23.4R2-S4-EVO, >=24.2 <24.2R2-EVO
- (no CPE)range: 0
- Range: <22.2R3-S6, >=22.4 <22.4R3-S6, >=23.2 <23.2R2-S3, >=23.4 <23.4R2-S4, >=24.2 <24.2R2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- supportportal.juniper.net/JSA100066mitrevendor-advisory
News mentions
0No linked articles in our index yet.