CVE-2024-30382

CVSS V2 None CVSS V3 None
Description
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS). This issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below). This issue affects: Junos OS: * all versions before 20.4R3-S10, * from 21.2 before 21.2R3-S8, * from 21.3 before 21.3R3, * from 21.4 before 21.4R3, * from 22.1 before 22.1R2; Junos OS Evolved: * all versions before 21.2R3-S8-EVO, * from 21.3 before 21.3R3-EVO, * from 21.4 before 21.4R3-EVO, * from 22.1 before 22.1R2-EVO.
Overview
  • CVE ID
  • CVE-2024-30382
  • Assigner
  • juniper
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2024-04-12T15:22:03.210Z
  • Last Modified Date
  • 2024-06-04T17:39:41.914Z
History
Created Old Value New Value Data Type Notes
2024-06-26 11:38:27 Added to TrackCVE