Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2024-39559

Disclosure Date: July 10, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication enabled, destined to an accessible port on the device, resulting in a Denial of Service (DoS).  The receipt of this packet must occur within a specific timing window outside the attacker’s control (i.e., race condition).

Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

This issue only affects dual RE systems with Nonstop Active Routing (NSR) enabled.
Exploitation can only occur over TCP sessions with MD5 authentication enabled (e.g., BGP with MD5 authentication).

This issue affects Junos OS Evolved: 

  • All versions before 21.2R3-S8-EVO,
  • from 21.4-EVO before 21.4R3-S6-EVO,
  • from 22.1-EVO before 22.1R3-S4-EVO,
  • from 22.2-EVO before 22.2R3-S4-EVO,
  • from 22.3-EVO before 22.3R3-S3-EVO,
  • from 22.4-EVO before 22.4R2-S2-EVO, 22.4R3-EVO.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Additional Info

Technical Analysis