Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r929-9699-qx4q

Опубликовано: 15 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 6.8
CVSS3: 5.5

Описание

An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS).

When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. 'show route ... extensive' is not affected.

This issue affects:

Junos OS: 

  • all versions before 22.4R3-S8,
  • 23.2 versions before 23.2R2-S5,
  • 23.4 versions before 23.4R2-S5,
  • 24.2 versions before 24.2R2-S2,
  • 24.4 versions before 24.4R2;

Junos OS Evolved:

  • all versions before 22.4R3-S8-EVO, 
  • 23.2 versions before 23.2R2-S5-EVO,
  • 23.4 versions before 23.4R2-S6-EVO,
  • 24.2 versions before 24.2R2-S2-EVO,
  • 24.4 versions before 24.4R2-EVO.

An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS).

When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. 'show route ... extensive' is not affected.

This issue affects:

Junos OS: 

  • all versions before 22.4R3-S8,
  • 23.2 versions before 23.2R2-S5,
  • 23.4 versions before 23.4R2-S5,
  • 24.2 versions before 24.2R2-S2,
  • 24.4 versions before 24.4R2;

Junos OS Evolved:

  • all versions before 22.4R3-S8-EVO, 
  • 23.2 versions before 23.2R2-S5-EVO,
  • 23.4 versions before 23.4R2-S6-EVO,
  • 24.2 versions before 24.2R2-S2-EVO,
  • 24.4 versions before 24.4R2-EVO.

EPSS

Процентиль: 2%
0.00014
Низкий

6.8 Medium

CVSS4

5.5 Medium

CVSS3

Дефекты

CWE-822

Связанные уязвимости

CVSS3: 5.5
nvd
23 дня назад

An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS). When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. 'show route ... extensive' is not affected. This issue affects: Junos OS:  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO,  * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.

EPSS

Процентиль: 2%
0.00014
Низкий

6.8 Medium

CVSS4

5.5 Medium

CVSS3

Дефекты

CWE-822