Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21587— Junos OS: MX Series: Memory leak in bbe-smgd process if BFD liveness detection for DHCP subscribers is enabled

CVSS 6.5 · Medium EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-21587

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: MX Series: Memory leak in bbe-smgd process if BFD liveness detection for DHCP subscribers is enabled
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an attacker directly connected to the vulnerable system who repeatedly flaps DHCP subscriber sessions to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). Memory can only be recovered by manually restarting bbe-smgd. This issue only occurs if BFD liveness detection for DHCP subscribers is enabled. Systems without BFD liveness detection enabled are not vulnerable to this issue. Indication of the issue can be observed by periodically executing the 'show system processes extensive' command, which will indicate an increase in memory allocation for bbe-smgd. A small amount of memory is leaked every time a DHCP subscriber logs in, which will become visible over time, ultimately leading to memory starvation. user@junos> show system processes extensive | match bbe-smgd 13071 root 24 0 415M 201M select 0 0:41 7.28% bbe-smgd{bbe-smgd} 13071 root 20 0 415M 201M select 1 0:04 0.00% bbe-smgd{bbe-smgd} ... user@junos> show system processes extensive | match bbe-smgd 13071 root 20 0 420M 208M select 0 4:33 0.10% bbe-smgd{bbe-smgd} 13071 root 20 0 420M 208M select 0 0:12 0.00% bbe-smgd{bbe-smgd} ... This issue affects Juniper Networks Junos OS on MX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对异常条件的处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS 存在安全漏洞,该漏洞源于宽带边缘用户管理守护程序 (bbe-smgd) 中存在异常情况处理不当漏洞。攻击者可以直接连接到易受攻击的系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 0 ~ 20.4R3-S9 -

II. Public POCs for CVE-2024-21587

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-21587

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2024-01-12 · 23 CVEs total

CVE-2024-215919.8 CRITICALJunos OS: SRX Series and EX Series: Security Vulnerability in J-web allows a preAuth Remot
CVE-2024-216167.5 HIGHJunos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allo
CVE-2024-216147.5 HIGHJunos OS and Junos OS Evolved: A specific query via DREND causes rpd crash
CVE-2024-216127.5 HIGHJunos OS Evolved: Specific TCP traffic causes OFP core and restart of RE
CVE-2024-216117.5 HIGHJunos OS and Junos OS Evolved: In a jflow scenario continuous route churn will cause a mem
CVE-2024-216067.5 HIGHJunos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flo
CVE-2024-216047.5 HIGHJunos OS Evolved: A high rate of specific traffic will cause a complete system outage
CVE-2024-216027.5 HIGHJunos OS Evolved: ACX7024, ACX7100-32C and ACX7100-48L: Traffic stops when a specific IPv4
CVE-2024-215957.5 HIGHJunos OS: EX4100, EX4400, EX4600, QFX5000 Series: A high rate of specific ICMP traffic wil
CVE-2024-215897.4 HIGHParagon Active Assurance Control Center: Information disclosure vulnerability
CVE-2023-368426.5 MEDIUMJunos OS: jdhcpd will hang on receiving a specific DHCP packet
CVE-2024-216176.5 MEDIUMJunos OS: BGP flap on NSR-enabled devices causes memory leak
CVE-2024-215996.5 MEDIUMJunos OS: MX Series: MPC3E memory leak with PTP configuration
CVE-2024-216006.5 MEDIUMJunos OS: PTX Series: In an FTI scenario MPLS packets hitting reject next-hop will cause a
CVE-2024-216036.5 MEDIUMJunos OS: MX Series: Gathering statistics in a scaled SCU/DCU configuration will lead to a
CVE-2024-216136.5 MEDIUMJunos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd c
CVE-2024-216015.9 MEDIUMJunos OS: SRX Series: Due to an error in processing TCP events flowd will crash
CVE-2024-215855.9 MEDIUMJunos OS and Junos OS Evolved: BGP session flaps on NSR-enabled devices can cause rpd cras
CVE-2024-215945.5 MEDIUMJunos OS: SRX 5000 Series: Repeated execution of a specific CLI command causes a flowd cra
CVE-2024-215975.3 MEDIUMJunos OS: MX Series: In an AF scenario traffic can bypass configured lo0 firewall filters

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-21587

No comments yet


Leave a comment