CVE-2024-30382
CVSS V2 None
CVSS V3 None
Description
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS).
This issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below).
This issue affects:
Junos OS:
* all versions before 20.4R3-S10,
* from 21.2 before 21.2R3-S8,
* from 21.3 before 21.3R3,
* from 21.4 before 21.4R3,
* from 22.1 before 22.1R2;
Junos OS Evolved:
* all versions before 21.2R3-S8-EVO,
* from 21.3 before 21.3R3-EVO,
* from 21.4 before 21.4R3-EVO,
* from 22.1 before 22.1R2-EVO.
Overview
- CVE ID
- CVE-2024-30382
- Assigner
- juniper
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-12T15:22:03.210Z
- Last Modified Date
- 2024-06-04T17:39:41.914Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://supportportal.juniper.net/JSA79174 | vendor-advisory |
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L | technical-description |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-30382 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30382 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 11:38:27 | Added to TrackCVE |