Juniper Junos OS Evolved PFE DDoS Queue Overfill DoS (21.4R3)
CVE-2024-47489 Published on October 11, 2024
Junos OS Evolved: ACX Series: Receipt of specific transit protocol packets is incorrectly processed by the RE
An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traffic to cause a partial Denial of Service (DoS) to downstream devices.
Receipt of specific transit protocol packets is incorrectly processed by the Routing Engine (RE), filling up the DDoS protection queue which is shared between routing protocols. This influx of transit protocol packets causes DDoS protection violations, resulting in protocol flaps which can affect connectivity to networking devices.
This issue affects both IPv4 and IPv6. This issue does not require any specific routing protocol to be configured or enabled.
The following commands can be used to monitor the DDoS protection queue:
labuser@re0> show evo-pfemand host pkt-stats
?? labuser@re0> show host-path ddos all-policers
This issue affects Junos OS Evolved:
* All versions before 21.4R3-S8-EVO,
* from 22.2 before 22.2R3-S4-EVO,
* from 22.3 before 22.3R3-S4-EVO,
* from 22.4 before 22.4R3-S3-EVO,
* from 23.2 before 23.2R2-EVO,
* from 23.4 before 23.4R1-S1-EVO, 23.4R2-EVO,
* from 24.2 before 24.2R2-EVO.
Vulnerability Analysis
CVE-2024-47489 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a small impact on availability.
Weakness Type
Improper Handling of Exceptional Conditions
The software does not handle or incorrectly handles an exceptional condition.
Products Associated with CVE-2024-47489
Want to know whenever a new CVE is published for Juniper Networks Junos Os Evolved? stack.watch will email you.
Affected Versions
Juniper Networks Junos OS Evolved:- Before 21.4R3-S8-EVO is affected.
- Version 22.2 and below 22.2R3-S4-EVO is affected.
- Version 22.3 and below 22.3R3-S4-EVO is affected.
- Version 22.4 and below 22.4R3-S3-EVO is affected.
- Version 23.2 and below 23.2R2-EVO is affected.
- Version 23.4 and below 23.4R1-S1-EVO, 23.4R2-EVO is affected.
- Version 24.2 and below 24.2R2-EVO is affected.
- Before 21.4r3-s8-evo is affected.
- Version 22.2 and below 22.2r3-s4-evo is affected.
- Version 22.3 and below 22.3r3-s4-evo is affected.
- Version 22.4 and below 22.4r3-s3-evo is affected.
- Version 23.2 and below 23.2r2-evo is affected.
- Version 23.4 and below 23.4r1-s1-evo is affected.
- Version 23.4 and below 23.4r2-evo is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.