Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Junos RPD DoS Vulnerability

Information

Severity

Severity

High

Family

Family

JunOS Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

7 years ago

Modified

Modified

5 years ago

Summary

Junos OS is prone to a denial of service vulnerability in RPD.

Insight

Insight

On Junos OS devices where the BGP add-path feature is enabled with 'send' option or with both 'send' and 'receive' options, a network based attacker can cause the Junos OS rpd daemon to crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. Junos OS devices that do not have the BGP add-path feature enabled are not affected by this issue. Junos OS devices that only have the 'receive' option with BGP add-path feature enabled are not affected by this issue.

Affected Software

Affected Software

Junos OS 12.1, 12.3, 13.3, 14.1, 14.2 and 15.1.

Detection Method

Detection Method

Checks if a vulnerable OS build is present on the target host.

Solution

Solution

New builds of Junos OS software are available from Juniper. As a workaround disable the BGP add-path feature completely or disable the 'send' option of BGP add-path.

Common Vulnerabilities and Exposures (CVE)