Junos OS RPD Race Condition Crash with BGP Multipath (CVE-2024-39554)
CVE-2024-39554 Published on July 10, 2024
Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the
Routing Protocol Daemon (rpd)
of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash and restart, resulting in a Denial of Service (DoS). Since this is a timing issue (race condition), the successful exploitation of this vulnerability is outside the attacker's control. However, continued receipt and processing of this packet may create a sustained Denial of Service (DoS) condition.
On all Junos OS and Junos OS Evolved platforms with BGP multipath enabled, a specific multipath calculation removes the original next hop from the multipath lead routes nexthop-set. When this change happens, multipath relies on certain internal timing to record the update. Under certain circumstance and with specific timing, this could result in an rpd crash.
This issue only affects systems with BGP multipath enabled.
This issue affects:
Junos OS:
* All versions of 21.1
* from 21.2 before 21.2R3-S7,
* from 21.4 before 21.4R3-S6,
* from 22.1 before 22.1R3-S5,
* from 22.2 before 22.2R3-S3,
* from 22.3 before 22.3R3-S2,
* from 22.4 before 22.4R3,
* from 23.2 before 23.2R2.
Junos OS Evolved:
* All versions of 21.1-EVO,
* All versions of 21.2-EVO,
* from 21.4-EVO before 21.4R3-S6-EVO,
* from 22.1-EVO before 22.1R3-S5-EVO,
* from 22.2-EVO before 22.2R3-S3-EVO,
* from 22.3-EVO before 22.3R3-S2-EVO,
* from 22.4-EVO before 22.4R3-EVO,
* from 23.2-EVO before 23.2R2-EVO.
Versions of Junos OS before 21.1R1 are unaffected by this vulnerability.
Versions of Junos OS Evolved before 21.1R1-EVO are unaffected by this vulnerability.
Vulnerability Analysis
CVE-2024-39554 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is a Race Condition Vulnerability?
The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
CVE-2024-39554 has been classified to as a Race Condition vulnerability or weakness.
Products Associated with CVE-2024-39554
stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Junos or Juniper Networks Junos Os Evolved. Just hit a watch button to start following.
Affected Versions
Juniper Networks Junos OS:- Version 21.1 and below 21.1* is affected.
- Version 21.2 and below 21.2R3-S7 is affected.
- Version 21.4 and below 21.4R3-S6 is affected.
- Version 22.1 and below 22.1R3-S5 is affected.
- Version 22.2 and below 22.2R3-S3 is affected.
- Version 22.3 and below 22.3R3-S2 is affected.
- Version 22.4 and below 22.4R3 is affected.
- Version 23.2 and below 23.2R2 is affected.
- Before 21.1R1 is unaffected.
- Version 21.1-EVO and below 21.1*-EVO is affected.
- Version 21.2-EVO and below 21.2*-EVO is affected.
- Version 21.4-EVO and below 21.4R3-S6-EVO is affected.
- Version 22.1-EVO and below 22.1R3-S5-EVO is affected.
- Version 22.2-EVO and below 22.2R3-S3-EVO is affected.
- Version 22.3-EVO and below 22.3R3-S2-EVO is affected.
- Version 22.4-EVO and below 22.4R3-EVO is affected.
- Version 23.2-EVO and below 23.2R2-EVO is affected.
- Before 21.1R1-EVO is unaffected.
- Version 21.1 and below 21.1* is affected.
- Version 21.2 and below 21.2r3-s7 is affected.
- Version 21.4 and below 21.4r3-s6 is affected.
- Version 22.1 and below 22.1r3-s5 is affected.
- Version 22.2 and below 22.2r3-s3 is affected.
- Version 22.3 and below 22.3r3-s2 is affected.
- Version 22.4 and below 22.4r3 is affected.
- Version 23.2 and below 23.2r2 is affected.
- Before 21.1r1 is affected.
- Before 21.1r1-evo is affected.
- Version 21.1-evo and below 21.1*-evo is affected.
- Version 21.2-evo and below 21.2*-evo is affected.
- Version 21.4-evo and below 21.4r3-s6-evo is affected.
- Version 22.1-evo and below 22.1r3-s5-evo is affected.
- Version 22.2-evo and below 22.2r3-s3-evo is affected.
- Version 22.3-evo and below 22.3r3-s2-evo is affected.
- Version 22.4-evo and below 22.4r3-evo is affected.
- Version 23.2-evo and below 23.2r2-evo is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.