CVE-2024-21614
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/01/2024
Last modified:
18/01/2024
Description
<br />
An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).<br />
<br />
On all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.<br />
<br />
This issue affects:<br />
<br />
Juniper Networks Junos OS<br />
<br />
<br />
<br />
* 22.2 versions earlier than 22.2R2-S2, 22.2R3;<br />
* 22.3 versions earlier than 22.3R2, 22.3R3.<br />
<br />
<br />
<br />
<br />
Juniper Networks Junos OS Evolved<br />
<br />
<br />
<br />
* 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;<br />
* 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.<br />
<br />
<br />
<br />
<br />
This issue does not affect Juniper Networks:<br />
<br />
Junos OS versions earlier than 22.2R1;<br />
<br />
Junos OS Evolved versions earlier than 22.2R1-EVO.<br />
<br />
<br />
<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



