Juniper Junos OS DoS via l2ald before 21.4R3-S7, 22.1R3-S5...
CVE-2024-39517 Published on July 10, 2024
Junos OS and Junos OS Evolved: Upon processing specific L2 traffic, rpd can hang in devices with EVPN/VXLAN configured
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).
In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services.
This issue affects both IPv4 and IPv6 implementations.
This issue affects
Junos OS:
All versions earlier than 21.4R3-S7;
22.1 versions earlier than 22.1R3-S5;
22.2 versions earlier than 22.2R3-S3;
22.3 versions earlier than 22.3R3-S3;
22.4 versions earlier than 22.4R3-S2;
23.2 versions earlier than 23.2R2;
23.4 versions earlier than 23.4R1-S1.
Junos OS Evolved:
All versions earlier than 21.4R3-S7-EVO;
22.1-EVO versions earlier than 22.1R3-S5-EVO;
22.2-EVO versions earlier than 22.2R3-S3-EVO;
22.3-EVO versions earlier than 22.3R3-S3-EVO;
22.4-EVO versions earlier than 22.4R3-S2-EVO;
23.2-EVO versions earlier than 23.2R2-EVO;
23.4-EVO versions earlier than 23.4R1-S1-EVO, 23.4R2-EVO.
Vulnerability Analysis
Weakness Type
Improper Check for Unusual or Exceptional Conditions
The software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.
Products Associated with CVE-2024-39517
stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Junos or Juniper Networks Junos Os Evolved. Just hit a watch button to start following.
Affected Versions
Juniper Networks Junos OS:- Before 21.2R3-S8 is affected.
- Version 21.4 and below 21.4R3-S7 is affected.
- Version 22.1 and below 22.1R3-S5 is affected.
- Version 22.2 and below 22.2R3-S3 is affected.
- Version 22.3 and below 22.3R3-S3 is affected.
- Version 22.4 and below 22.4R3-S2 is affected.
- Version 23.2 and below 23.2R2 is affected.
- Version 23.4 and below 23.4R1-S1 is affected.
- Before 21.2R3-S8-EVO is affected.
- Version 21.4-EVO and below 21.4R3-S7-EVO is affected.
- Version 22.1-EVO and below 22.1R3-S5-EVO is affected.
- Version 22.2-EVO and below 22.2R3-S3-EVO is affected.
- Version 22.3-EVO and below 22.3R3-S3-EVO is affected.
- Version 22.4-EVO and below 22.4R3-S2-EVO is affected.
- Version 23.2-EVO and below 23.2R2-EVO is affected.
- Version 23.4-EVO and below 23.4R1-S1-EVO, 23.4R2-EVO is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.