CVE-2024-39531

7.5 HIGH

📋 TL;DR

An improper handling of values vulnerability in Juniper's Packet Forwarding Engine allows unauthenticated network attackers to cause denial-of-service. When DDoS bandwidth/burst parameters are configured for one protocol, all protocols sharing the same queue inherit those values, potentially making control plane traffic vulnerable to volumetric attacks. This affects Junos OS Evolved on ACX 7000 Series routers.

💻 Affected Systems

Products:
  • Juniper Networks ACX 7000 Series routers
Versions: All versions before 21.4R3-S7-EVO, 22.1 before 22.1R3-S6-EVO, 22.2 before 22.2R3-S3-EVO, 22.3 before 22.3R3-S3-EVO, 22.4 before 22.4R3-S2-EVO, 23.2 before 23.2R2-EVO, 23.4 before 23.4R1-S1-EVO and 23.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DDoS bandwidth or burst parameters are configured for protocols in shared queues. Default configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete control plane disruption through volumetric DoS attacks, rendering the router inoperable and causing network-wide outages.

🟠

Likely Case

Degraded routing protocol performance leading to network instability, packet loss, and intermittent connectivity issues.

🟢

If Mitigated

Limited impact if proper traffic segmentation and monitoring are in place, though configuration errors could still cause issues.

🌐 Internet-Facing: HIGH - Network-based, unauthenticated attack vector makes internet-facing routers particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access and knowledge of vulnerable configurations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Attack requires sending traffic to exploit misconfigured bandwidth limits but doesn't require authentication.

Exploitation requires knowledge of which protocols share queues and their configured bandwidth limits. Attackers can probe for vulnerable configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.4R3-S7-EVO, 22.1R3-S6-EVO, 22.2R3-S3-EVO, 22.3R3-S3-EVO, 22.4R3-S2-EVO, 23.2R2-EVO, 23.4R1-S1-EVO, 23.4R2-EVO

Vendor Advisory: https://supportportal.juniper.net/JSA82991

Restart Required: Yes

Instructions:

1. Download appropriate patched version from Juniper support portal. 2. Backup current configuration. 3. Install update via CLI or J-Web interface. 4. Reboot device to apply changes. 5. Verify version and configuration.

🔧 Temporary Workarounds

Remove DDoS bandwidth configurations

all

Temporarily remove DDoS bandwidth and burst parameter configurations from all protocols to eliminate the vulnerability.

delete class-of-service traffic-control-profiles <profile-name> shaping-rate
delete class-of-service traffic-control-profiles <profile-name> burst-size

Isolate protocol queues

all

Configure separate queues for different protocols to prevent cross-protocol bandwidth inheritance.

set class-of-service forwarding-classes queue <queue-number> protocol <protocol-name>
set class-of-service traffic-control-profiles <profile-name> forwarding-class <class-name>

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to ACX 7000 management interfaces
  • Deploy DDoS protection appliances upstream to filter malicious traffic before it reaches vulnerable routers

🔍 How to Verify

Check if Vulnerable:

Check if DDoS bandwidth/burst parameters are configured for any protocol: 'show configuration class-of-service traffic-control-profiles | display set' and look for shaping-rate or burst-size settings.

Check Version:

show version | match Junos

Verify Fix Applied:

Verify running version is patched: 'show version' and check against fixed versions. Also verify DDoS configurations are properly isolated.

📡 Detection & Monitoring

Log Indicators:

  • Increased control plane protocol errors (OSPF/ISIS adjacency flaps)
  • High CPU utilization on PFE
  • Traffic shaping/dropping alerts in system logs

Network Indicators:

  • Unusual traffic patterns targeting control plane protocols
  • Increased packet loss on routing protocols
  • Protocol timeouts and retransmissions

SIEM Query:

source="junos" AND ("PFE" OR "control-plane") AND ("error" OR "drop" OR "flap") AND ("OSPF" OR "ISIS" OR "BGP")

🔗 References

📤 Share & Export