CVE-2024-21614

7.5 HIGH

📋 TL;DR

An unauthenticated network attacker can crash the Routing Protocol Daemon (RPD) on Juniper Junos OS and Junos OS Evolved by sending a specific Dynamic Rendering query when NETCONF and gRPC are enabled. This causes a denial of service, and repeated attacks can sustain the DoS condition. Affected systems are Junos OS 22.2-22.3 and Junos OS Evolved 22.2-22.3 with specific vulnerable versions.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS
  • Juniper Networks Junos OS Evolved
Versions: Junos OS: 22.2 versions earlier than 22.2R2-S2, 22.2R3; 22.3 versions earlier than 22.3R2, 22.3R3. Junos OS Evolved: 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO; 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO.
Operating Systems: Junos OS, Junos OS Evolved
Default Config Vulnerable: ✅ No
Notes: Requires NETCONF and gRPC to be enabled. Versions earlier than 22.2R1/22.2R1-EVO are not affected.

📦 What is this software?

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained denial of service affecting all routing functionality, potentially causing network-wide outages and service disruption.

🟠

Likely Case

Intermittent RPD crashes leading to routing instability, packet loss, and temporary network disruption until the daemon restarts.

🟢

If Mitigated

Limited to isolated RPD restarts with minimal impact if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - Network-based unauthenticated attack means internet-facing devices with vulnerable configurations are directly exploitable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems can exploit this, but requires NETCONF/gRPC access which may be restricted internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a specific Dynamic Rendering query via NETCONF/gRPC interface. No authentication needed, making it straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Junos OS: 22.2R2-S2, 22.2R3, 22.3R2, 22.3R3; Junos OS Evolved: 22.2R2-S2-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.3R3-EVO

Vendor Advisory: https://supportportal.juniper.net/JSA75755

Restart Required: Yes

Instructions:

1. Download appropriate fixed version from Juniper support portal. 2. Backup current configuration. 3. Install update using 'request system software add' command. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Disable NETCONF and gRPC

all

Disables the vulnerable services required for exploitation

set system services netconf disabled
set system services extension-service request-response grpc disable
commit

Restrict NETCONF/gRPC access

all

Limit access to NETCONF and gRPC services to trusted networks only

set system services netconf ssh client-alive-count-max 0
set firewall family inet filter PROTECT-NETCONF term ALLOW-TRUSTED from source-address [trusted-networks]
set firewall family inet filter PROTECT-NETCONF term DENY-ALL then discard
set interfaces [interface-name] unit 0 family inet filter input PROTECT-NETCONF
commit

🧯 If You Can't Patch

  • Implement strict network access controls to limit NETCONF/gRPC access to trusted management networks only.
  • Monitor RPD process health and implement automated restart scripts to minimize DoS impact.

🔍 How to Verify

Check if Vulnerable:

Check version with 'show version' and verify if NETCONF/gRPC are enabled with 'show configuration system services'.

Check Version:

show version

Verify Fix Applied:

Verify installed version is patched with 'show version' and test NETCONF/gRPC functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • RPD crash messages in /var/log/messages
  • NETCONF/gRPC connection attempts from unusual sources
  • Increased RPD restart frequency

Network Indicators:

  • Unusual NETCONF/gRPC traffic patterns
  • Multiple RPD restart events within short timeframes

SIEM Query:

source="/var/log/messages" "rpd" AND ("crash" OR "restart" OR "core dumped")

🔗 References

📤 Share & Export