CVE-2024-39547

7.5 HIGH

📋 TL;DR

An unauthenticated network attacker can send crafted TCP traffic to Juniper Junos OS routing engines to cause CPU-based denial of service in the rpd-server process. This affects Junos OS and Junos OS Evolved with cRPD across multiple versions. The impact is more severe when RIB sharding is enabled.

💻 Affected Systems

Products:
  • Juniper Junos OS
  • Juniper Junos OS Evolved
Versions: Junos OS: All versions before 21.2R3-S8, 21.4 before 21.4R3-S7, 22.1 before 22.1R3-S6, 22.2 before 22.2R3-S4, 22.3 before 22.3R3-S3, 22.4 before 22.4R3-S2, 23.2 before 23.2R2-S2, 24.2 before 24.2R2; Junos OS Evolved: All versions before 21.4R3-S7-EVO, 22.2 before 22.2R3-S4-EVO, 22.3 before 22.3R3-S3-EVO, 22.4 before 22.4R3-S2-EVO, 23.2 before 23.2R2-EVO
Operating Systems: Junos OS, Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Requires cRPD (containerized Routing Protocol Daemon) deployment. Impact is more severe when RIB sharding is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete control plane disruption causing network outages and loss of routing functionality across affected devices.

🟠

Likely Case

Degraded routing performance, increased latency, and potential service interruptions due to CPU exhaustion.

🟢

If Mitigated

Minimal impact with proper network segmentation and traffic filtering in place.

🌐 Internet-Facing: HIGH - Unauthenticated network-based attack that can be triggered from the internet if routing engine is exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to routing engine.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Unauthenticated network-based attack with crafted TCP traffic.

Attack requires sending crafted TCP traffic to the routing engine control plane.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Junos OS: 21.2R3-S8, 21.4R3-S7, 22.1R3-S6, 22.2R3-S4, 22.3R3-S3, 22.4R3-S2, 23.2R2-S2, 24.2R2; Junos OS Evolved: 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO, 22.4R3-S2-EVO, 23.2R2-EVO

Vendor Advisory: https://supportportal.juniper.net/JSA88108

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Juniper support portal. 2. Apply patch following Juniper upgrade procedures. 3. Reboot device to activate patched software.

🔧 Temporary Workarounds

Control Plane Protection

all

Implement control plane protection policies to filter TCP traffic to routing engine.

set firewall family inet filter PROTECT-CP term BLOCK-TCP from protocol tcp
set firewall family inet filter PROTECT-CP term BLOCK-TCP then discard

Disable RIB Sharding

all

Disable RIB sharding to reduce attack impact severity.

delete routing-options rib-sharding

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate routing engine from untrusted networks.
  • Deploy intrusion prevention systems with signatures for crafted TCP traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check version with 'show version' and compare against affected versions list. Monitor for high CPU utilization in rpd-server process.

Check Version:

show version

Verify Fix Applied:

Verify version is patched with 'show version' and monitor rpd-server CPU utilization under normal traffic conditions.

📡 Detection & Monitoring

Log Indicators:

  • High CPU utilization by rpd-server process
  • Unexpected TCP connection attempts to routing engine
  • Task accounting showing abnormal read operations by RPD Server jobs

Network Indicators:

  • Crafted TCP packets targeting routing engine ports
  • Unusual TCP traffic patterns to control plane interfaces

SIEM Query:

process_name:rpd-server AND cpu_usage:>80% OR tcp_dst_port:780 AND tcp_flags:malformed

🔗 References

📤 Share & Export