CVE-2024-21614 (GCVE-0-2024-21614)
Vulnerability from cvelistv5 – Published: 2024-01-12 00:56 – Updated: 2025-06-17 21:09
VLAI?
Title
Junos OS and Junos OS Evolved: A specific query via DREND causes rpd crash
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).
On all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.
This issue affects:
Juniper Networks Junos OS
* 22.2 versions earlier than 22.2R2-S2, 22.2R3;
* 22.3 versions earlier than 22.3R2, 22.3R3.
Juniper Networks Junos OS Evolved
* 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;
* 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.
This issue does not affect Juniper Networks:
Junos OS versions earlier than 22.2R1;
Junos OS Evolved versions earlier than 22.2R1-EVO.
Severity ?
7.5 (High)
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
- Denial of Service (DoS)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Juniper Networks | Junos OS |
Affected:
22.2 , < 22.2R2-S2, 22.2R3
(semver)
Affected: 22.3 , < 22.3R2, 22.3R3 (semver) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:27:35.708Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://supportportal.juniper.net/JSA75755"
},
{
"tags": [
"technical-description",
"x_transferred"
],
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21614",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-12T15:43:59.854503Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-17T21:09:20.833Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Junos OS",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "22.2R2-S2, 22.2R3",
"status": "affected",
"version": "22.2",
"versionType": "semver"
},
{
"lessThan": "22.3R2, 22.3R3",
"status": "affected",
"version": "22.3",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Junos OS Evolved",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "22.2R2-S2-EVO, 22.2R3-EVO",
"status": "affected",
"version": "22.2",
"versionType": "semver"
},
{
"lessThan": "22.3R2-EVO, 22.3R3-EVO",
"status": "affected",
"version": "22.3",
"versionType": "semver"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eFor this issue to occur, NETCONF and gRPC should be enabled.\u003c/p\u003e\u003ccode\u003e [ netconf ssh ]\u003c/code\u003e\u003cbr/\u003e\u003ccode\u003e [ system services extension-service request-response grpc ]\u003c/code\u003e\u003cbr/\u003e"
}
],
"value": "For this issue to occur, NETCONF and gRPC should be enabled.\n\n [ netconf ssh ]\n [ system services extension-service request-response grpc ]\n"
}
],
"datePublic": "2024-01-10T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cp\u003eAn Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).\u003c/p\u003e\u003cp\u003eOn all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.\u003c/p\u003e\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003eJuniper Networks Junos OS\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e22.2 versions earlier than 22.2R2-S2, 22.2R3;\u003c/li\u003e\u003cli\u003e22.3 versions earlier than 22.3R2, 22.3R3.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eJuniper Networks Junos OS Evolved\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;\u003c/li\u003e\u003cli\u003e22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eThis issue does not affect Juniper Networks:\u003c/p\u003e\u003cp\u003eJunos OS versions earlier than 22.2R1;\u003c/p\u003e\u003cp\u003eJunos OS Evolved versions earlier than 22.2R1-EVO.\u003c/p\u003e\n\n"
}
],
"value": "\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.\n\nThis issue affects:\n\nJuniper Networks Junos OS\n\n\n\n * 22.2 versions earlier than 22.2R2-S2, 22.2R3;\n * 22.3 versions earlier than 22.3R2, 22.3R3.\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n\n * 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;\n * 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.\n\n\n\n\nThis issue does not affect Juniper Networks:\n\nJunos OS versions earlier than 22.2R1;\n\nJunos OS Evolved versions earlier than 22.2R1-EVO.\n\n\n\n"
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\u003c/p\u003e"
}
],
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"description": "Denial of Service (DoS)",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-12T00:56:05.953Z",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://supportportal.juniper.net/JSA75755"
},
{
"tags": [
"technical-description"
],
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe following software releases have been updated to resolve this specific issue.\u003c/p\u003e\u003cp\u003eJunos OS: 22.2R2-S2, 22.2R3, 22.3R2, 22.3R3, 22.4R1, and all subsequent releases.\u003c/p\u003e\u003cp\u003eJunos OS Evolved: 22.2R2-S2-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases.\u003c/p\u003e"
}
],
"value": "The following software releases have been updated to resolve this specific issue.\n\nJunos OS: 22.2R2-S2, 22.2R3, 22.3R2, 22.3R3, 22.4R1, and all subsequent releases.\n\nJunos OS Evolved: 22.2R2-S2-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases.\n\n"
}
],
"source": {
"advisory": "JSA75755",
"defect": [
"1697622"
],
"discovery": "USER"
},
"timeline": [
{
"lang": "en",
"time": "2024-01-10T17:00:00.000Z",
"value": "Initial Publication"
}
],
"title": "Junos OS and Junos OS Evolved: A specific query via DREND causes rpd crash",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThere are no known workarounds for this issue.\u003c/p\u003e"
}
],
"value": "There are no known workarounds for this issue.\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-av217"
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2024-21614",
"datePublished": "2024-01-12T00:56:05.953Z",
"dateReserved": "2023-12-27T19:38:25.709Z",
"dateUpdated": "2025-06-17T21:09:20.833Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"06156CD6-09D3-4A05-9C5E-BC64A70640F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E949B21B-AD62-4022-9088-06313277479E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D862E6F-0D01-4B25-8340-888C30F75A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F28F73E-8563-41B9-A313-BBAAD5B57A67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E37D4694-C80B-475E-AB5B-BB431F59C5E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC0D2D2-4922-4675-8A2C-57A08D7BE334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"19519212-51DD-4448-B115-8A20A40192CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CC9909E-AE9F-414D-99B1-83AA04D5297B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDE9E767-4713-4EA2-8D00-1382975A4A15\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3CA3365-F9AF-40DF-8700-30AD4BC58E27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D77A072D-350A-42F2-8324-7D3AC1711BF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"83AE395C-A651-4568-88E3-3600544BF799\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"81CC3480-4B65-4588-8D46-FA80A8F6D143\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE2EF84D-55A9-41DC-A324-69E1DC426D0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"433631CA-3AC4-4D66-9B46-AEA4209347F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E4CD8AD-277A-4FC5-A102-3E151060C216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BC09BAC-83E7-48CE-B571-ED49277B2987\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"\\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).\\n\\nOn all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.\\n\\nThis issue affects:\\n\\nJuniper Networks Junos OS\\n\\n\\n\\n * 22.2 versions earlier than 22.2R2-S2, 22.2R3;\\n * 22.3 versions earlier than 22.3R2, 22.3R3.\\n\\n\\n\\n\\nJuniper Networks Junos OS Evolved\\n\\n\\n\\n * 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;\\n * 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.\\n\\n\\n\\n\\nThis issue does not affect Juniper Networks:\\n\\nJunos OS versions earlier than 22.2R1;\\n\\nJunos OS Evolved versions earlier than 22.2R1-EVO.\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de verificaci\\u00f3n inadecuada de condiciones inusuales o excepcionales en Routing Protocol Daemon (RPD) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red cause que rpd falle, lo que lleva a una denegaci\\u00f3n de servicio (DoS). En todas las plataformas Junos OS y Junos OS Evolved, cuando NETCONF y gRPC est\\u00e1n habilitados y se ejecuta una consulta espec\\u00edfica mediante representaci\\u00f3n din\\u00e1mica (DREND), rpd fallar\\u00e1 y se reiniciar\\u00e1. La ejecuci\\u00f3n continua de esta consulta espec\\u00edfica provocar\\u00e1 una condici\\u00f3n sostenida de Denegaci\\u00f3n de Servicio (DoS). Este problema afecta a: Juniper Networks Junos OS * 22.2 versiones anteriores a 22.2R2-S2, 22.2R3; * Versiones 22.3 anteriores a 22.3R2, 22.3R3. Juniper Networks Junos OS Evolved * 22.2 versiones anteriores a 22.2R2-S2-EVO, 22.2R3-EVO; * Versiones 22.3 anteriores a 22.3R2-EVO, 22.3R3-EVO. Este problema no afecta a Juniper Networks: versiones de Junos OS anteriores a 22.2R1; Versiones de Junos OS Evolved anteriores a 22.2R1-EVO.\"}]",
"id": "CVE-2024-21614",
"lastModified": "2024-11-21T08:54:43.510",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-01-12T01:15:49.837",
"references": "[{\"url\": \"https://supportportal.juniper.net/JSA75755\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://supportportal.juniper.net/JSA75755\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-754\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-754\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-21614\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2024-01-12T01:15:49.837\",\"lastModified\":\"2024-11-21T08:54:43.510\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause rpd to crash, leading to Denial of Service (DoS).\\n\\nOn all Junos OS and Junos OS Evolved platforms, when NETCONF and gRPC are enabled, and a specific query is executed via Dynamic Rendering (DREND), rpd will crash and restart. Continuous execution of this specific query will cause a sustained Denial of Service (DoS) condition.\\n\\nThis issue affects:\\n\\nJuniper Networks Junos OS\\n\\n\\n\\n * 22.2 versions earlier than 22.2R2-S2, 22.2R3;\\n * 22.3 versions earlier than 22.3R2, 22.3R3.\\n\\n\\n\\n\\nJuniper Networks Junos OS Evolved\\n\\n\\n\\n * 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO;\\n * 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.\\n\\n\\n\\n\\nThis issue does not affect Juniper Networks:\\n\\nJunos OS versions earlier than 22.2R1;\\n\\nJunos OS Evolved versions earlier than 22.2R1-EVO.\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de verificaci\u00f3n inadecuada de condiciones inusuales o excepcionales en Routing Protocol Daemon (RPD) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red cause que rpd falle, lo que lleva a una denegaci\u00f3n de servicio (DoS). En todas las plataformas Junos OS y Junos OS Evolved, cuando NETCONF y gRPC est\u00e1n habilitados y se ejecuta una consulta espec\u00edfica mediante representaci\u00f3n din\u00e1mica (DREND), rpd fallar\u00e1 y se reiniciar\u00e1. La ejecuci\u00f3n continua de esta consulta espec\u00edfica provocar\u00e1 una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema afecta a: Juniper Networks Junos OS * 22.2 versiones anteriores a 22.2R2-S2, 22.2R3; * Versiones 22.3 anteriores a 22.3R2, 22.3R3. Juniper Networks Junos OS Evolved * 22.2 versiones anteriores a 22.2R2-S2-EVO, 22.2R3-EVO; * Versiones 22.3 anteriores a 22.3R2-EVO, 22.3R3-EVO. Este problema no afecta a Juniper Networks: versiones de Junos OS anteriores a 22.2R1; Versiones de Junos OS Evolved anteriores a 22.2R1-EVO.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"06156CD6-09D3-4A05-9C5E-BC64A70640F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E949B21B-AD62-4022-9088-06313277479E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D862E6F-0D01-4B25-8340-888C30F75A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F28F73E-8563-41B9-A313-BBAAD5B57A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37D4694-C80B-475E-AB5B-BB431F59C5E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC0D2D2-4922-4675-8A2C-57A08D7BE334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"19519212-51DD-4448-B115-8A20A40192CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC9909E-AE9F-414D-99B1-83AA04D5297B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDE9E767-4713-4EA2-8D00-1382975A4A15\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CA3365-F9AF-40DF-8700-30AD4BC58E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77A072D-350A-42F2-8324-7D3AC1711BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83AE395C-A651-4568-88E3-3600544BF799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"81CC3480-4B65-4588-8D46-FA80A8F6D143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE2EF84D-55A9-41DC-A324-69E1DC426D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"433631CA-3AC4-4D66-9B46-AEA4209347F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4CD8AD-277A-4FC5-A102-3E151060C216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC09BAC-83E7-48CE-B571-ED49277B2987\"}]}]}],\"references\":[{\"url\":\"https://supportportal.juniper.net/JSA75755\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://supportportal.juniper.net/JSA75755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…