Lucene search

K
cveJuniperCVE-2024-21614
HistoryJan 12, 2024 - 1:15 a.m.

CVE-2024-21614

2024-01-1201:15:49
CWE-754
juniper
web.nvd.nist.gov
43
cve-2024-21614
nvd
juniper networks
junos os
junos os evolved
vulnerability
rpd
dos
netconf
grpc
drend

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.8%

An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).

On all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.

This issue affects:

Juniper Networks Junos OS

  • 22.2 versions earlier than 22.2R2-S2, 22.2R3;
  • 22.3 versions earlier than 22.3R2, 22.3R3.

Juniper Networks Junos OS Evolved

  • 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;
  • 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.

This issue does not affect Juniper Networks:

Junos OS versions earlier than 22.2R1;

Junos OS Evolved versions earlier than 22.2R1-EVO.

Affected configurations

Nvd
Node
juniperjunosMatch22.2-
OR
juniperjunosMatch22.2r1
OR
juniperjunosMatch22.2r1-s1
OR
juniperjunosMatch22.2r1-s2
OR
juniperjunosMatch22.2r2
OR
juniperjunosMatch22.2r2-s1
OR
juniperjunosMatch22.3-
OR
juniperjunosMatch22.3r1
OR
juniperjunosMatch22.3r1-s1
OR
juniperjunosMatch22.3r1-s2
Node
juniperjunos_os_evolvedMatch22.2-
OR
juniperjunos_os_evolvedMatch22.2r1
OR
juniperjunos_os_evolvedMatch22.2r1-s1
OR
juniperjunos_os_evolvedMatch22.2r2
OR
juniperjunos_os_evolvedMatch22.2r2-s1
OR
juniperjunos_os_evolvedMatch22.3-
OR
juniperjunos_os_evolvedMatch22.3r1
OR
juniperjunos_os_evolvedMatch22.3r1-s1
OR
juniperjunos_os_evolvedMatch22.3r1-s2
VendorProductVersionCPE
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*
juniperjunos22.3cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*
juniperjunos22.3cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*
juniperjunos22.3cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*
juniperjunos22.3cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*
Rows per page:
1-10 of 191

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "22.2R2-S2, 22.2R3",
        "status": "affected",
        "version": "22.2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R2, 22.3R3",
        "status": "affected",
        "version": "22.3",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS Evolved",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "22.2R2-S2-EVO, 22.2R3-EVO",
        "status": "affected",
        "version": "22.2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R2-EVO, 22.3R3-EVO",
        "status": "affected",
        "version": "22.3",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.8%

Related for CVE-2024-21614