Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cf83-h37v-rjpm

Опубликовано: 11 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.2
CVSS3: 5.9

Описание

A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device.

When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts.

This issue affects:

Junos OS:  * all versions before 21.2R3-S9,

  • 21.4 versions before 21.4R3-S10, 
  • 22.2 versions before 22.2R3-S6,
  • 22.4 versions before 22.4R3-S6,
  • 23.2 versions before 23.2R2-S3,
  • 23.4 versions before 23.4R2-S4,
  • 24.2 versions before 24.2R1-S2, 24.2R2;

Junos OS Evolved:

  • all versions before 22.4R3-S7-EVO,
  • 23.2-EVO

versions before 23.2R2-S3-EVO,

  • 23.4-EVO versions before 23.4R2-S4-EVO,
  • 24.2-EVO versions before 24.2R2-EVO.

A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device.

When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts.

This issue affects:

Junos OS:  * all versions before 21.2R3-S9,

  • 21.4 versions before 21.4R3-S10, 
  • 22.2 versions before 22.2R3-S6,
  • 22.4 versions before 22.4R3-S6,
  • 23.2 versions before 23.2R2-S3,
  • 23.4 versions before 23.4R2-S4,
  • 24.2 versions before 24.2R1-S2, 24.2R2;

Junos OS Evolved:

  • all versions before 22.4R3-S7-EVO,
  • 23.2-EVO

versions before 23.2R2-S3-EVO,

  • 23.4-EVO versions before 23.4R2-S4-EVO,
  • 24.2-EVO versions before 24.2R2-EVO.

EPSS

Процентиль: 18%
0.00057
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-476

Связанные уязвимости

CVSS3: 5.9
nvd
2 месяца назад

A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device. When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts. This issue affects: Junos OS:  * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10,  * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R1-S2, 24.2R2; Junos OS Evolved: * all versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S3-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO.

CVSS3: 5.9
fstec
2 месяца назад

Уязвимость демона Routing Protocol Daemon (RPD) операционных систем Juniper Networks Junos OS и Junos OS Evolved, позволяющая нарушителю оказать воздействие на доступность устройства

EPSS

Процентиль: 18%
0.00057
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-476