CVE-2024-30394

AStack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS).

On all Junos OS and Junos OS Evolved platforms, when EVPN is configured, and a specific EVPN type-5 route is received via BGP, rpd crashes and restarts. Continuous receipt of this specific route will lead to a sustained Denial of Service (DoS) condition.

This issue affects:
Junos OS:



  *  all versions before 21.2R3-S7,

  *  from 21.4 before 21.4R3-S5,

  *  from 22.1 before 22.1R3-S4,

  *  from 22.2 before 22.2R3-S2,

  *  from 22.3 before 22.3R3-S1,

  *  from 22.4 before 22.4R3,

  *  from 23.2 before 23.2R2.





Junos OS Evolved:



  *  all versions before 21.4R3-S5-EVO,

  *  from 22.1-EVO before 22.1R3-S4-EVO,

  *  from 22.2-EVO before 22.2R3-S2-EVO,

  *  from 22.3-EVO before 22.3R3-S1-EVO,

  *  from 22.4-EVO before 22.4R3-EVO,

  *  from 23.2-EVO before 23.2R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
juniperjunos_os
𝑥
< 21.2R3-S7
juniperjunos_os
21.4R3-S5 <
𝑥
< 21.4R3-S5
juniperjunos_os
22.1R3-S4 <
𝑥
< 22.1R3-S4
juniperjunos_os
22.2R3-S2 <
𝑥
< 22.2R3-S2
juniperjunos_os
22.3R3-S1 <
𝑥
< 22.3R3-S1
juniperjunos_os
22.4R3 <
𝑥
< 22.4R3
juniperjunos_os
23.2R2 <
𝑥
< 23.2R2
juniperjunos_os_evolved
𝑥
< 21.4R3-S5-EVO
juniperjunos
𝑥
< 21.2
juniperjunos
21.2
juniperjunos
21.2:r1
juniperjunos
21.2:r1-s1
juniperjunos
21.2:r1-s2
juniperjunos
21.2:r2
juniperjunos
21.2:r2-s1
juniperjunos
21.2:r2-s2
juniperjunos
21.2:r3
juniperjunos
21.2:r3-s1
juniperjunos
21.2:r3-s2
juniperjunos
21.2:r3-s3
juniperjunos
21.2:r3-s4
juniperjunos
21.2:r3-s5
juniperjunos
21.2:r3-s6
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r2-s1
juniperjunos
21.4:r2-s2
juniperjunos
21.4:r3
juniperjunos
21.4:r3-s1
juniperjunos
21.4:r3-s2
juniperjunos
21.4:r3-s3
juniperjunos
21.4:r3-s4
juniperjunos
22.1
juniperjunos
22.1:r1
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.1:r2
juniperjunos
22.1:r2-s1
juniperjunos
22.1:r2-s2
juniperjunos
22.1:r3
juniperjunos
22.1:r3-s1
juniperjunos
22.1:r3-s2
juniperjunos
22.1:r3-s3
juniperjunos
22.2
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
juniperjunos
22.2:r2
juniperjunos
22.2:r2-s1
juniperjunos
22.2:r2-s2
juniperjunos
22.2:r3
juniperjunos
22.2:r3-s1
juniperjunos
22.3
juniperjunos
22.3:r1
juniperjunos
22.3:r1-s1
juniperjunos
22.3:r1-s2
juniperjunos
22.3:r2
juniperjunos
22.3:r2-s1
juniperjunos
22.3:r2-s2
juniperjunos
22.3:r3
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
juniperjunos
23.2
juniperjunos
23.2:r1
juniperjunos
23.2:r1-s1
juniperjunos
23.2:r1-s2
juniperjunos_os_evolved
𝑥
< 21.4
juniperjunos_os_evolved
21.4
juniperjunos_os_evolved
21.4:r1
juniperjunos_os_evolved
21.4:r1-s1
juniperjunos_os_evolved
21.4:r1-s2
juniperjunos_os_evolved
21.4:r2
juniperjunos_os_evolved
21.4:r2-s1
juniperjunos_os_evolved
21.4:r2-s2
juniperjunos_os_evolved
21.4:r3
juniperjunos_os_evolved
21.4:r3-s1
juniperjunos_os_evolved
21.4:r3-s2
juniperjunos_os_evolved
21.4:r3-s3
juniperjunos_os_evolved
21.4:r3-s4
juniperjunos_os_evolved
22.1
juniperjunos_os_evolved
22.1:r1
juniperjunos_os_evolved
22.1:r1-s1
juniperjunos_os_evolved
22.1:r1-s2
juniperjunos_os_evolved
22.1:r2
juniperjunos_os_evolved
22.1:r2-s1
juniperjunos_os_evolved
22.1:r3
juniperjunos_os_evolved
22.1:r3-s1
juniperjunos_os_evolved
22.1:r3-s2
juniperjunos_os_evolved
22.1:r3-s3
juniperjunos_os_evolved
22.2
juniperjunos_os_evolved
22.2:r1
juniperjunos_os_evolved
22.2:r1-s1
juniperjunos_os_evolved
22.2:r1-s2
juniperjunos_os_evolved
22.2:r2
juniperjunos_os_evolved
22.2:r2-s1
juniperjunos_os_evolved
22.2:r2-s2
juniperjunos_os_evolved
22.2:r3
juniperjunos_os_evolved
22.2:r3-s1
juniperjunos_os_evolved
22.3
juniperjunos_os_evolved
22.3:r1
juniperjunos_os_evolved
22.3:r1-s1
juniperjunos_os_evolved
22.3:r1-s2
juniperjunos_os_evolved
22.3:r2
juniperjunos_os_evolved
22.3:r2-s1
juniperjunos_os_evolved
22.3:r2-s2
juniperjunos_os_evolved
22.3:r3
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r1-s2
𝑥
= Vulnerable software versions