CVE-2024-47489

5.8 MEDIUM

📋 TL;DR

An unauthenticated attacker can send specific transit protocol traffic to Juniper ACX Series devices running vulnerable Junos OS Evolved versions, causing DDoS protection queue exhaustion. This leads to protocol flaps and partial denial of service affecting downstream devices. The vulnerability affects both IPv4 and IPv6 traffic and doesn't require any specific routing protocol configuration.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved on ACX Series devices
Versions: All versions before 21.4R3-S8-EVO, from 22.2 before 22.2R3-S4-EVO, from 22.3 before 22.3R3-S4-EVO, from 22.4 before 22.4R3-S3-EVO, from 23.2 before 23.2R2-EVO, from 23.4 before 23.4R1-S1-EVO, 23.4R2-EVO, from 24.2 before 24.2R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both IPv4 and IPv6. No specific routing protocol configuration required. Only affects ACX Series devices with Packet Forwarding Engine (pfe).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained attack causes complete protocol disruption, affecting connectivity to multiple downstream networking devices and potentially cascading network outages.

🟠

Likely Case

Partial denial of service with protocol flaps, intermittent connectivity issues, and degraded network performance for downstream devices.

🟢

If Mitigated

With proper monitoring and rate limiting, impact is limited to temporary protocol flaps with minimal service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending specific transit protocol packets but details are not publicly disclosed. Network-based attack doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-EVO, 23.4R1-S1-EVO, 24.2R2-EVO or later

Vendor Advisory: https://supportportal.juniper.net/

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate fixed version from Juniper support portal. 3. Follow Juniper upgrade procedures for Junos OS Evolved. 4. Reboot device after upgrade.

🔧 Temporary Workarounds

Monitor DDoS Protection Queues

all

Regularly monitor DDoS protection queue status to detect potential attacks early

labuser@re0> show evo-pfemand host pkt-stats
labuser@re0> show host-path ddos all-policers

🧯 If You Can't Patch

  • Implement network segmentation to isolate ACX Series devices from untrusted networks
  • Deploy rate limiting and traffic filtering to block suspicious transit protocol traffic

🔍 How to Verify

Check if Vulnerable:

Run 'show version' and compare against affected version ranges. Check if device is ACX Series running Junos OS Evolved.

Check Version:

show version

Verify Fix Applied:

After patching, verify version is updated to fixed version with 'show version'. Monitor DDoS queues for abnormal activity.

📡 Detection & Monitoring

Log Indicators:

  • DDoS protection violations in system logs
  • Protocol flaps and routing instability events
  • High packet drop rates in pfe statistics

Network Indicators:

  • Unusual transit protocol traffic spikes
  • Increased protocol adjacency changes
  • Connectivity issues to downstream devices

SIEM Query:

Search for 'DDoS protection violation' OR 'protocol flap' OR 'pfe queue full' in Juniper device logs

🔗 References

📤 Share & Export