CVE-2024-47508

6.5 MEDIUM

📋 TL;DR

This CVE describes a resource exhaustion vulnerability in Juniper Junos OS Evolved where authenticated attackers can cause FPC crashes through specific SNMP GET operations or CLI commands. The vulnerability leads to GUID resource leaks that eventually exhaust resources, requiring manual restart of affected FPCs. This affects Junos OS Evolved versions before specific patched releases.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions before 21.2R3-S8-EVO, 21.3 versions before 21.3R3-EVO, 21.4 versions before 22.1R2-EVO, 22.1 versions before 22.1R1-S1-EVO and 22.1R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PFE management daemon (evo-pfemand). Requires authenticated access to SNMP or CLI interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service affecting multiple FPCs, requiring manual intervention to restore network functionality, potentially disrupting critical network operations.

🟠

Likely Case

Targeted FPC crashes causing localized service disruption that requires manual restart of affected hardware components.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, allowing early detection before widespread exhaustion occurs.

🌐 Internet-Facing: MEDIUM - Requires authenticated access, but SNMP interfaces may be exposed to management networks.
🏢 Internal Only: HIGH - Authenticated internal users or compromised accounts can trigger the vulnerability through legitimate management interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but uses legitimate SNMP GET operations or CLI commands.

Exploitation requires authenticated access to network management interfaces. Similar vulnerabilities exist (CVE-2024-47505, CVE-2024-47509) but this is distinct.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.2R3-S8-EVO, 21.3R3-EVO, 22.1R2-EVO, 22.1R1-S1-EVO, or later versions

Vendor Advisory: https://supportportal.juniper.net/

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate patched version from Juniper support portal. 3. Follow Juniper's standard upgrade procedures for Junos OS Evolved. 4. Reboot affected devices after upgrade.

🔧 Temporary Workarounds

Monitor GUID usage

all

Regularly check for GUID resource leaks to detect exploitation attempts early

show platform application-info allocations app evo-pfemand/evo-pfemand

Restrict management access

all

Limit SNMP and CLI access to trusted management networks and authorized users only

🧯 If You Can't Patch

  • Implement strict access controls on SNMP and CLI interfaces
  • Monitor syslog for 'Ran out of Guid Space' messages and 'show platform application-info allocations' output regularly

🔍 How to Verify

Check if Vulnerable:

Check version with 'show version' and compare against affected versions. Monitor GUID usage with 'show platform application-info allocations app evo-pfemand/evo-pfemand' for increasing values.

Check Version:

show version

Verify Fix Applied:

Confirm version is patched with 'show version'. Monitor that GUID values in 'show platform application-info allocations app evo-pfemand/evo-pfemand' remain stable and don't constantly increase.

📡 Detection & Monitoring

Log Indicators:

  • evo-pfemand[<pid>]: get_next_guid: Ran out of Guid Space ...
  • evo-aftmand-zx[<pid>]: get_next_guid: Ran out of Guid Space ...

Network Indicators:

  • Unusual SNMP GET request patterns to management interfaces
  • Multiple CLI commands from single sources in short timeframes

SIEM Query:

source="juniper_logs" AND ("Ran out of Guid Space" OR "get_next_guid")

🔗 References

📤 Share & Export