CVE-2024-21604

7.5 HIGH

📋 TL;DR

An unauthenticated network attacker can cause a complete and persistent system outage on Juniper Junos OS Evolved by sending a high rate of specific valid packets that exhaust kernel connection tracking resources. This affects Junos OS Evolved across multiple version branches, leading to routing engine connectivity loss and denial of service.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions earlier than 20.4R3-S7-EVO; 21.2R1-EVO and later versions; 21.4-EVO versions earlier than 21.4R3-S5-EVO; 22.1-EVO versions earlier than 22.1R3-S2-EVO; 22.2-EVO versions earlier than 22.2R3-EVO; 22.3-EVO versions earlier than 22.3R2-EVO; 22.4-EVO versions earlier than 22.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Default configurations are vulnerable. The vulnerability requires processing of specific valid packets at high rates to trigger the resource exhaustion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete and persistent system outage where the routing engine loses connectivity with all chassis components, requiring physical intervention or reboot to restore service.

🟠

Likely Case

Denial of service causing network connectivity loss and service disruption until system is rebooted or packets are filtered.

🟢

If Mitigated

Minimal impact if proper lo0 firewall filters are implemented to block or limit the specific packets triggering the resource exhaustion.

🌐 Internet-Facing: HIGH - Unauthenticated network-based attack that can be triggered from any network location without authentication.
🏢 Internal Only: HIGH - Attack can originate from internal networks as well, though may be easier to detect and contain internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending high volumes of specific valid packets but doesn't require authentication or special privileges. The exact packet types are not publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.4R3-S7-EVO, 21.4R3-S5-EVO, 22.1R3-S2-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.4R2-EVO and later versions

Vendor Advisory: https://supportportal.juniper.net/JSA75745

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate fixed version from Juniper support portal. 3. Follow Juniper upgrade procedures for Junos OS Evolved. 4. Reboot system after upgrade completion.

🔧 Temporary Workarounds

Implement lo0 Firewall Filter

all

Configure a carefully designed firewall filter on the loopback interface (lo0) to block or limit the specific packets that trigger the resource exhaustion

Configure firewall filter on lo0 interface per Juniper documentation
Apply filter to lo0 interface with 'set interfaces lo0 unit 0 family inet filter input FILTER_NAME'

🧯 If You Can't Patch

  • Implement strict lo0 firewall filtering to block or rate-limit suspicious traffic
  • Implement network segmentation and access controls to limit who can send traffic to routing engine interfaces

🔍 How to Verify

Check if Vulnerable:

Check current Junos OS Evolved version with 'show version' command and compare against affected version ranges

Check Version:

show version

Verify Fix Applied:

Verify version is patched with 'show version' and check for absence of 'nf_conntrack: table full, dropping packet' kernel messages

📡 Detection & Monitoring

Log Indicators:

  • kernel: nf_conntrack: nf_conntrack: table full, dropping packet
  • Increased packet drop rates on lo0 interface
  • Routing engine connectivity loss messages

Network Indicators:

  • Unusual high-rate traffic to routing engine interfaces
  • Sudden loss of routing protocol adjacencies
  • Increased packet drops on management interfaces

SIEM Query:

source="junos" AND "nf_conntrack: table full" OR "dropping packet" AND "kernel"

🔗 References

📤 Share & Export