CVE-2024-39513

5.5 MEDIUM

📋 TL;DR

A local privilege escalation vulnerability in Juniper Junos OS Evolved allows low-privileged users to crash the Packet Forwarding Engine by running a specific 'clear' command, causing denial of service for all traffic through affected FPCs. Repeated exploitation can sustain the DoS condition. This affects multiple Junos OS Evolved versions across various release trains.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions before 20.4R3-S9-EVO, from 21.2-EVO before 21.2R3-S7-EVO, from 21.3-EVO before 21.3R3-S5-EVO, from 21.4-EVO before 21.4R3-S6-EVO, from 22.1-EVO before 22.1R3-S4-EVO, from 22.2-EVO before 22.2R3-S3-EVO, from 22.3-EVO before 22.3R3-S3-EVO, from 22.4-EVO before 22.4R3-EVO, from 23.2-EVO before 23.2R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) running. Requires local access to the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained network outage affecting all traffic through affected FPCs, requiring manual intervention to restore service.

🟠

Likely Case

Temporary traffic disruption during PFE restart, with potential for repeated attacks causing extended downtime.

🟢

If Mitigated

Limited impact if proper access controls prevent low-privileged users from executing the vulnerable command.

🌐 Internet-Facing: LOW - Requires local access to the device, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local low-privileged attackers can cause significant network disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and knowledge of the specific 'clear' command. No authentication bypass needed as low-privileged users can trigger it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R3-S3-EVO, 22.4R3-EVO, 23.2R2-EVO and later

Vendor Advisory: https://supportportal.juniper.net/JSA82978

Restart Required: Yes

Instructions:

1. Identify affected devices using 'show version' command. 2. Download appropriate fixed version from Juniper support portal. 3. Schedule maintenance window. 4. Install update using standard Junos upgrade procedures. 5. Reboot device to activate new version.

🔧 Temporary Workarounds

Restrict command execution

all

Limit access to the specific 'clear' command using Junos role-based access control (RBAC)

set system login class <class-name> deny-commands "clear <specific-command>"
commit

🧯 If You Can't Patch

  • Implement strict RBAC to prevent low-privileged users from executing any 'clear' commands
  • Monitor for PFE crashes and evo-aftmand process restarts in system logs

🔍 How to Verify

Check if Vulnerable:

Run 'show version' and compare against affected version ranges. Check if evo-aftmand processes are running.

Check Version:

show version

Verify Fix Applied:

After patching, verify version is at or above fixed versions. Attempt to run the specific 'clear' command (in controlled environment) to confirm it no longer crashes PFE.

📡 Detection & Monitoring

Log Indicators:

  • PFE crash logs
  • evo-aftmand process restart messages
  • Unexpected traffic drops through FPCs

Network Indicators:

  • Sudden traffic loss through specific FPCs
  • Increased packet loss on interfaces

SIEM Query:

source="junos" AND ("PFE crash" OR "evo-aftmand" AND restart) OR ("clear" command executed by low-privileged user)

🔗 References

📤 Share & Export