Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2024-21611

NAME
__________
Juniper Networks Junos OS and Junos OS Evolved denial of service

Platforms Affected:
Juniper Networks Junos OS Evolved 21.4
Juniper Networks Junos OS 21.4
Juniper Networks Junos OS 22.1
Juniper Networks Junos OS 22.2
Juniper Networks Junos OS 22.4
Juniper Networks Junos OS Evolved 22.1
Juniper Networks Junos OS Evolved 22.2
Juniper Networks Junos OS Evolved 22.4

Risk Level:
7.5

Exploitability:
Unproven

Consequences:
Denial of Service

DESCRIPTION
__________

Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by missing release of memory after effective lifetime in the Routing Protocol Daemon (rpd). In a Juniper Flow Monitoring (jflow) scenario route churn that causes BGP next hops to be updated, a remote attacker could exploit this vulnerability to cause a slow memory leak and eventually a crash and restart of rpd.

CVSS 3.0 Information
__________

Privileges Required:
None

User Interaction:
None

Scope:
Unchanged

Access Vector:
Network


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.