Description
This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS). This issue affects: Junos OS: * from 22.4 before 22.4R3-S4. Junos OS Evolved: * from 22.4 before 22.4R3-S4-EVO.
References (1)
Scores
CVSS v3
7.5
EPSS
0.0034
EPSS Percentile
56.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-415
Status
published
Products (4)
juniper/junos
21.2 (15 CPE variants)
juniper/junos
21.4 (15 CPE variants)
juniper/junos
22.2 (12 CPE variants)
juniper/junos
22.3 (8 CPE variants)
Published
Feb 05, 2025
Tracked Since
Feb 18, 2026