CVE-2024-30382

HIGH

Juniper Junos OS Evolved < 20.4 - Improper Exception Handling

Title source: rule
STIX 2.1

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS). This issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below). This issue affects: Junos OS: * all versions before 20.4R3-S10, * from 21.2 before 21.2R3-S8, * from 21.3 before 21.3R3, * from 21.4 before 21.4R3, * from 22.1 before 22.1R2; Junos OS Evolved: * all versions before 21.2R3-S8-EVO, * from 21.3 before 21.3R3-EVO, * from 21.4 before 21.4R3-EVO, * from 22.1 before 22.1R2-EVO.

Scores

CVSS v3 7.5
EPSS 0.0065
EPSS Percentile 70.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-755
Status published
Products (6)
juniper/junos 20.4 (16 CPE variants)
juniper/junos 21.2 (15 CPE variants)
juniper/junos 21.3 (7 CPE variants)
juniper/junos 21.4 (7 CPE variants)
juniper/junos 22.1 (4 CPE variants)
juniper/junos < 20.4
Published Apr 12, 2024
Tracked Since Feb 18, 2026