

Microsoft 365 Accounts Targeted by New Mamba 2FA Bypass Service – Active IOCs
October 10, 2024
North Korean Threat Actors Infect Developers with Cross-Platform Malware via Fake Interviews – Active IOCs
October 10, 2024
Microsoft 365 Accounts Targeted by New Mamba 2FA Bypass Service – Active IOCs
October 10, 2024
North Korean Threat Actors Infect Developers with Cross-Platform Malware via Fake Interviews – Active IOCs
October 10, 2024Severity
High
Analysis Summary
CVE-2024-39525 CVSS:8.7
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
CVE-2024-39516 CVSS:8.7
Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
CVE-2024-39515 CVSS:8.7
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
Impact
- Denial of Service
- Gain Access
Indicators of Compromise
CVE
- CVE-2024-39525
- CVE-2024-39516
- CVE-2024-39515
Affected Vendors
Affected Products
- Junos OS 21.2R3-S8
- Junos OS 21.4 - 21.4R3-S8
- Junos OS 22.2 - 22.2R3-S4
- Junos OS 22.3 - 22.3R3-S4
- Junos OS 22.4 - 22.4R3-S3
- Junos OS 23.2 - 23.2R2-S1
- Junos OS 23.4 - 23.4R2
- Junos OS Evolved 21.2R3-S8-EVO
- Junos OS Evolved 21.4-EVO - 21.4R3-S8-EVO
- Junos OS Evolved 22.2-EVO - 22.2R3-S4-EVO
- Junos OS Evolved 22.3-EVO - 22.3R3-S4-EVO
- Junos OS Evolved 22.4-EVO - 22.4R3-S3-EVO
- Junos OS Evolved 23.2-EVO - 23.2R2-S1-EVO
- Junos OS Evolved 23.4-EVO - 23.4R2-EVO
Remediation
Refer to Juniper Networks Security Advisory for patch, upgrade, or suggested workaround information.