cve-2024-39536
Vulnerability from cvelistv5
Published
2024-07-11 16:13
Modified
2024-08-02 04:26
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). When a BFD session configured with authentication flaps, ppmd memory can leak. Whether the leak happens depends on a race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode. Whether the leak occurs can be monitored with the following CLI command: > show ppm request-queue FPC     Pending-request fpc0                   2 request-total-pending: 2 where a continuously increasing number of pending requests is indicative of the leak.  This issue affects: Junos OS: * All versions before 21.2R3-S8, * 21.4 versions before 21.4R3-S7, * 22.1 versions before 22.1R3-S4, * 22.2 versions before 22.2R3-S4, * 22.3 versions before 22.3R3, * 22.4 versions before 22.4R2-S2, 22.4R3. Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * 21.4-EVO versions before 21.4R3-S7-EVO, * 22.2-EVO versions before 22.2R3-S4-EVO, * 22.3-EVO versions before 22.3R3-EVO, * 22.4-EVO versions before 22.4R3-EVO.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Create a notification for this product.
   Juniper Networks Junos OS Evolved Version: 21.2-EVO   
Version: 21.4-EVO   
Version: 22.2-EVO   
Version: 22.3-EVO   
Version: 22.4-EVO   
Version: 23.2-EVO   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "junos_os",
                  vendor: "juniper",
                  versions: [
                     {
                        lessThan: "21.2R3-S8",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                     {
                        lessThan: "21.4R3-S7",
                        status: "affected",
                        version: "21.4",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.1R3-S4",
                        status: "affected",
                        version: "22.1",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.2R3-S4",
                        status: "affected",
                        version: "22.2",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.3R3",
                        status: "affected",
                        version: "22.3",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.4R2-S2",
                        status: "affected",
                        version: "22.4",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.4R3",
                        status: "affected",
                        version: "22.4",
                        versionType: "semver",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "junos_os_evolved",
                  vendor: "juniper",
                  versions: [
                     {
                        lessThan: "21.2R3-S8-EVO",
                        status: "affected",
                        version: "21.2-EVO",
                        versionType: "semver",
                     },
                     {
                        lessThan: "21.4R3-S7-EVO",
                        status: "affected",
                        version: "21.4-EVO",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.2R3-S4-EVO",
                        status: "affected",
                        version: "22.2-EVO",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.3R3-EVO",
                        status: "affected",
                        version: "22.3-EVO",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.4R3-EVO",
                        status: "affected",
                        version: "22.4-EVO",
                        versionType: "semver",
                     },
                     {
                        lessThan: "23.2R1-EVO",
                        status: "affected",
                        version: "23.2-EVO",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-39536",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-16T18:38:58.684082Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-16T19:01:50.918Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:26:15.613Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA82996",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.2R3-S8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S7",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S4",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S4",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R2-S2, 22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "Junos OS Evolved",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.2R3-S8-EVO",
                     status: "affected",
                     version: "21.2-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S7-EVO",
                     status: "affected",
                     version: "21.4-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S4-EVO",
                     status: "affected",
                     version: "22.2-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-EVO",
                     status: "affected",
                     version: "22.3-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R3-EVO",
                     status: "affected",
                     version: "22.4-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R1-EVO",
                     status: "affected",
                     version: "23.2-EVO",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "To be exposed to this issue, BFD with authentication like in the following examples needs to be \n\n<span style=\"background-color: rgb(255, 255, 255);\">configured</span>:<br><br><tt>[ protocols &lt;protocol&gt; ... bfd-liveness-detection&nbsp;authentication ]<br>[ routing-options ... bfd-liveness-detection authentication ]</tt>",
                  },
               ],
               value: "To be exposed to this issue, BFD with authentication like in the following examples needs to be \n\nconfigured:\n\n[ protocols <protocol> ... bfd-liveness-detection authentication ]\n[ routing-options ... bfd-liveness-detection authentication ]",
            },
         ],
         datePublic: "2024-07-10T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\n<span style=\"background-color: rgb(255, 255, 255);\">Denial-of-Service (DoS)</span>.<p><br></p><p><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">When a&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">BFD session configured with authentication </span>flaps,&nbsp;</span>ppmd memory can leak. Whether the leak happens depends on a&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.</span></span><br><span style=\"background-color: rgb(255, 255, 255);\"><br></span></p><p><span style=\"background-color: rgb(255, 255, 255);\">Whether the leak occurs can be monitored with the following CLI command:</span></p><p>&gt; show ppm request-queue<br></p><tt><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">FPC &nbsp; &nbsp; Pending-request</span><br><span style=\"background-color: rgb(255, 255, 255);\">fpc0&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;2</span><br><span style=\"background-color: rgb(255, 255, 255);\">request-total-pending: 2</span>\n\n<br></span></tt><p><span style=\"background-color: rgb(255, 255, 255);\">where a continuously increasing number of pending requests is indicative of the leak.&nbsp;</span></p><p><span style=\"background-color: rgb(255, 255, 255);\"><br></span></p><p></p>\n\n<p>This issue affects:</p><p>Junos OS:<br></p><ul><li>All versions before 21.2R3-S8,</li><li>21.4 versions before 21.4R3-S7,</li><li>22.1 versions before 22.1R3-S4,</li><li>22.2 versions before 22.2R3-S4, </li><li>22.3 versions before 22.3R3,</li><li>22.4 versions before 22.4R2-S2, 22.4R3.</li></ul><br>Junos OS Evolved:<br><ul><li>All versions before 21.2R3-S8-EVO,</li><li>21.4-EVO versions before 21.4R3-S7-EVO,</li><li>22.2-EVO versions before 22.2R3-S4-EVO,</li><li>22.3-EVO versions before 22.3R3-EVO,</li><li>22.4-EVO versions before 22.4R3-EVO.</li></ul>",
                  },
               ],
               value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\n\nWhen a BFD session configured with authentication flaps, ppmd memory can leak. Whether the leak happens depends on a race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\n\n\n\nWhether the leak occurs can be monitored with the following CLI command:\n\n> show ppm request-queue\n\n\nFPC     Pending-request\nfpc0                   2\nrequest-total-pending: 2\n\n\nwhere a continuously increasing number of pending requests is indicative of the leak. \n\n\n\n\n\n\n\n\nThis issue affects:\n\nJunos OS:\n\n\n  *  All versions before 21.2R3-S8,\n  *  21.4 versions before 21.4R3-S7,\n  *  22.1 versions before 22.1R3-S4,\n  *  22.2 versions before 22.2R3-S4, \n  *  22.3 versions before 22.3R3,\n  *  22.4 versions before 22.4R2-S2, 22.4R3.\n\n\n\nJunos OS Evolved:\n  *  All versions before 21.2R3-S8-EVO,\n  *  21.4-EVO versions before 21.4R3-S7-EVO,\n  *  22.2-EVO versions before 22.2R3-S4-EVO,\n  *  22.3-EVO versions before 22.3R3-EVO,\n  *  22.4-EVO versions before 22.4R3-EVO.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "PRESENT",
                  attackVector: "ADJACENT",
                  baseScore: 6,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "NONE",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "NONE",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-401",
                     description: "CWE-401 Missing Release of Memory after Effective Lifetime",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial-of-Service (DoS)",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-07-12T14:42:59.790Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA82996",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue:<br>Junos OS: 21.2R3-S8, 21.4R3-S7, 22.1R3-S4, 22.2R3-S4, 22.3R3, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases;<br>Junos OS Evolved:&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.2R3-S8-EVO, 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-EVO, 22.4R3-EVO, 23.2R1-EVO,&nbsp;and all subsequent releases.</span>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue:\nJunos OS: 21.2R3-S8, 21.4R3-S7, 22.1R3-S4, 22.2R3-S4, 22.3R3, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases;\nJunos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-EVO, 22.4R3-EVO, 23.2R1-EVO, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA82996",
            defect: [
               "1480648",
            ],
            discovery: "USER",
         },
         title: "Junos OS and Junos OS Evolved: Flaps of BFD sessions with authentication cause a ppmd memory leak",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no known workarounds for this issue.",
                  },
               ],
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-39536",
      datePublished: "2024-07-11T16:13:24.485Z",
      dateReserved: "2024-06-25T15:12:53.241Z",
      dateUpdated: "2024-08-02T04:26:15.613Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-39536\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2024-07-11T17:15:11.190\",\"lastModified\":\"2024-11-21T09:27:57.373\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \\n\\nDenial-of-Service (DoS).\\n\\n\\nWhen a BFD session configured with authentication flaps, ppmd memory can leak. Whether the leak happens depends on a race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\\n\\n\\n\\nWhether the leak occurs can be monitored with the following CLI command:\\n\\n> show ppm request-queue\\n\\n\\nFPC     Pending-request\\nfpc0                   2\\nrequest-total-pending: 2\\n\\n\\nwhere a continuously increasing number of pending requests is indicative of the leak. \\n\\n\\n\\n\\n\\n\\n\\n\\nThis issue affects:\\n\\nJunos OS:\\n\\n\\n  *  All versions before 21.2R3-S8,\\n  *  21.4 versions before 21.4R3-S7,\\n  *  22.1 versions before 22.1R3-S4,\\n  *  22.2 versions before 22.2R3-S4, \\n  *  22.3 versions before 22.3R3,\\n  *  22.4 versions before 22.4R2-S2, 22.4R3.\\n\\n\\n\\nJunos OS Evolved:\\n  *  All versions before 21.2R3-S8-EVO,\\n  *  21.4-EVO versions before 21.4R3-S7-EVO,\\n  *  22.2-EVO versions before 22.2R3-S4-EVO,\\n  *  22.3-EVO versions before 22.3R3-EVO,\\n  *  22.4-EVO versions before 22.4R3-EVO.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de liberación de memoria faltante después de la vida útil efectiva en Periodic Packet Management Daemon (ppmd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). Cuando una sesión BFD se configura con solapas de autenticación, la memoria ppmd puede perderse. Que se produzca la fuga depende de una condición de ejecución que está fuera del control de los atacantes. Este problema solo afecta a BFD que opera en modo distribuido, también conocido como delegado (que es el comportamiento predeterminado) o en línea. Si se produce la fuga se puede monitorear con el siguiente comando CLI: &gt; show ppm request-queue FPC Pending-request fpc0 2 request-total-pending: 2 donde un número continuamente creciente de solicitudes pendientes es indicativo de la fuga. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * Versiones 21.4 anteriores a 21.4R3-S7, * Versiones 22.1 anteriores a 22.1R3-S4, * Versiones 22.2 anteriores a 22.2R3-S4, * Versiones 22.3 anteriores a 22.3R3, * Versiones 22.4 anteriores a 22.4R2-S2, 22.4R3, * Versiones 23.1 anteriores a 23.1R2. Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * Versiones 21.4-EVO anteriores a 21.4R3-S7-EVO, * Versiones 22.2-EVO anteriores a 22.2R3-S4-EVO, * Versiones 22.3-EVO anteriores a 22.3R3- EVO, *versiones 22.4-EVO anteriores a 22.4R3-EVO, *versiones 23.2-EVO anteriores a 23.2R1-EVO.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"NONE\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"references\":[{\"url\":\"https://supportportal.juniper.net/JSA82996\",\"source\":\"sirt@juniper.net\"},{\"url\":\"https://supportportal.juniper.net/JSA82996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-39536\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-16T18:38:58.684082Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*\"], \"vendor\": \"juniper\", \"product\": \"junos_os\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"21.2R3-S8\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.4\", \"lessThan\": \"21.4R3-S7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.1\", \"lessThan\": \"22.1R3-S4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.2\", \"lessThan\": \"22.2R3-S4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3\", \"lessThan\": \"22.3R3\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4R2-S2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4R3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*\"], \"vendor\": \"juniper\", \"product\": \"junos_os_evolved\", \"versions\": [{\"status\": \"affected\", \"version\": \"21.2-EVO\", \"lessThan\": \"21.2R3-S8-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.4-EVO\", \"lessThan\": \"21.4R3-S7-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.2-EVO\", \"lessThan\": \"22.2R3-S4-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3-EVO\", \"lessThan\": \"22.3R3-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4-EVO\", \"lessThan\": \"22.4R3-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2-EVO\", \"lessThan\": \"23.2R1-EVO\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-16T18:50:48.166Z\"}}], \"cna\": {\"title\": \"Junos OS and Junos OS Evolved: Flaps of BFD sessions with authentication cause a ppmd memory leak\", \"source\": {\"defect\": [\"1480648\"], \"advisory\": \"JSA82996\", \"discovery\": \"USER\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"21.2R3-S8\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.4\", \"lessThan\": \"21.4R3-S7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.1\", \"lessThan\": \"22.1R3-S4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.2\", \"lessThan\": \"22.2R3-S4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3\", \"lessThan\": \"22.3R3\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4R2-S2, 22.4R3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS Evolved\", \"versions\": [{\"status\": \"affected\", \"version\": \"21.2-EVO\", \"lessThan\": \"21.2R3-S8-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.4-EVO\", \"lessThan\": \"21.4R3-S7-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.2-EVO\", \"lessThan\": \"22.2R3-S4-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3-EVO\", \"lessThan\": \"22.3R3-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4-EVO\", \"lessThan\": \"22.4R3-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2-EVO\", \"lessThan\": \"23.2R1-EVO\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"base64\": false}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The following software releases have been updated to resolve this specific issue:\\nJunos OS: 21.2R3-S8, 21.4R3-S7, 22.1R3-S4, 22.2R3-S4, 22.3R3, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases;\\nJunos OS Evolved:\\u00a021.2R3-S8-EVO, 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-EVO, 22.4R3-EVO, 23.2R1-EVO,\\u00a0and all subsequent releases.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The following software releases have been updated to resolve this specific issue:<br>Junos OS: 21.2R3-S8, 21.4R3-S7, 22.1R3-S4, 22.2R3-S4, 22.3R3, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases;<br>Junos OS Evolved:&nbsp;<span style=\\\"background-color: rgb(255, 255, 255);\\\">21.2R3-S8-EVO, 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-EVO, 22.4R3-EVO, 23.2R1-EVO,&nbsp;and all subsequent releases.</span>\", \"base64\": false}]}], \"datePublic\": \"2024-07-10T16:00:00.000Z\", \"references\": [{\"url\": \"https://supportportal.juniper.net/JSA82996\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"There are no known workarounds for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"There are no known workarounds for this issue.\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \\n\\nDenial-of-Service (DoS).\\n\\n\\nWhen a\\u00a0BFD session configured with authentication flaps,\\u00a0ppmd memory can leak. Whether the leak happens depends on a\\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\\n\\n\\n\\nWhether the leak occurs can be monitored with the following CLI command:\\n\\n> show ppm request-queue\\n\\n\\nFPC \\u00a0 \\u00a0 Pending-request\\nfpc0\\u00a0 \\u00a0 \\u00a0 \\u00a0 \\u00a0 \\u00a0 \\u00a0 \\u00a0 \\u00a0 \\u00a02\\nrequest-total-pending: 2\\n\\n\\nwhere a continuously increasing number of pending requests is indicative of the leak.\\u00a0\\n\\n\\n\\n\\n\\n\\n\\n\\nThis issue affects:\\n\\nJunos OS:\\n\\n\\n  *  All versions before 21.2R3-S8,\\n  *  21.4 versions before 21.4R3-S7,\\n  *  22.1 versions before 22.1R3-S4,\\n  *  22.2 versions before 22.2R3-S4, \\n  *  22.3 versions before 22.3R3,\\n  *  22.4 versions before 22.4R2-S2, 22.4R3.\\n\\n\\n\\nJunos OS Evolved:\\n  *  All versions before 21.2R3-S8-EVO,\\n  *  21.4-EVO versions before 21.4R3-S7-EVO,\\n  *  22.2-EVO versions before 22.2R3-S4-EVO,\\n  *  22.3-EVO versions before 22.3R3-EVO,\\n  *  22.4-EVO versions before 22.4R3-EVO.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \\n\\n<span style=\\\"background-color: rgb(255, 255, 255);\\\">Denial-of-Service (DoS)</span>.<p><br></p><p><span style=\\\"background-color: rgb(255, 255, 255);\\\"><span style=\\\"background-color: rgb(255, 255, 255);\\\">When a&nbsp;<span style=\\\"background-color: rgb(255, 255, 255);\\\">BFD session configured with authentication </span>flaps,&nbsp;</span>ppmd memory can leak. Whether the leak happens depends on a&nbsp;<span style=\\\"background-color: rgb(255, 255, 255);\\\">race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.</span></span><br><span style=\\\"background-color: rgb(255, 255, 255);\\\"><br></span></p><p><span style=\\\"background-color: rgb(255, 255, 255);\\\">Whether the leak occurs can be monitored with the following CLI command:</span></p><p>&gt; show ppm request-queue<br></p><tt><span style=\\\"background-color: rgb(255, 255, 255);\\\"><span style=\\\"background-color: rgb(255, 255, 255);\\\">FPC &nbsp; &nbsp; Pending-request</span><br><span style=\\\"background-color: rgb(255, 255, 255);\\\">fpc0&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;2</span><br><span style=\\\"background-color: rgb(255, 255, 255);\\\">request-total-pending: 2</span>\\n\\n<br></span></tt><p><span style=\\\"background-color: rgb(255, 255, 255);\\\">where a continuously increasing number of pending requests is indicative of the leak.&nbsp;</span></p><p><span style=\\\"background-color: rgb(255, 255, 255);\\\"><br></span></p><p></p>\\n\\n<p>This issue affects:</p><p>Junos OS:<br></p><ul><li>All versions before 21.2R3-S8,</li><li>21.4 versions before 21.4R3-S7,</li><li>22.1 versions before 22.1R3-S4,</li><li>22.2 versions before 22.2R3-S4, </li><li>22.3 versions before 22.3R3,</li><li>22.4 versions before 22.4R2-S2, 22.4R3.</li></ul><br>Junos OS Evolved:<br><ul><li>All versions before 21.2R3-S8-EVO,</li><li>21.4-EVO versions before 21.4R3-S7-EVO,</li><li>22.2-EVO versions before 22.2R3-S4-EVO,</li><li>22.3-EVO versions before 22.3R3-EVO,</li><li>22.4-EVO versions before 22.4R3-EVO.</li></ul>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-401\", \"description\": \"CWE-401 Missing Release of Memory after Effective Lifetime\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"description\": \"Denial-of-Service (DoS)\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"To be exposed to this issue, BFD with authentication like in the following examples needs to be \\n\\nconfigured:\\n\\n[ protocols <protocol> ... bfd-liveness-detection\\u00a0authentication ]\\n[ routing-options ... bfd-liveness-detection authentication ]\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"To be exposed to this issue, BFD with authentication like in the following examples needs to be \\n\\n<span style=\\\"background-color: rgb(255, 255, 255);\\\">configured</span>:<br><br><tt>[ protocols &lt;protocol&gt; ... bfd-liveness-detection&nbsp;authentication ]<br>[ routing-options ... bfd-liveness-detection authentication ]</tt>\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2024-07-12T14:42:59.790Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-39536\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-07-16T19:01:50.918Z\", \"dateReserved\": \"2024-06-25T15:12:53.241Z\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"datePublished\": \"2024-07-11T16:13:24.485Z\", \"assignerShortName\": \"juniper\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.