Overview
The CVE-2024-21602 vulnerability resides in Juniper Networks Junos OS Evolved, specifically affecting ACX7024, ACX7100-32C, and ACX7100-48L models. This vulnerability can be exploited by an unauthenticated network-based attacker to trigger a Denial of Service (DoS) condition, making it a severe threat to the availability of affected devices and the network(s) they serve.
Vulnerability Summary
CVE ID: CVE-2024-21602
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Denial of Service, potential system compromise or data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Junos OS Evolved on ACX7024 | 21.4-EVO versions earlier than 21.4R3-S6-EVO
Junos OS Evolved on ACX7100-32C | 22.1-EVO versions earlier than 22.1R3-S5-EVO
Junos OS Evolved on ACX7100-48L | 22.2-EVO versions earlier than 22.2R2-S1-EVO, 22.2R3-EVO
How the Exploit Works
An attacker can exploit this vulnerability by sending a specially crafted IPv4 UDP packet to the target device. Upon receipt and processing of this packet, a NULL Pointer Dereference error is triggered in the Routing Engine (RE), causing the packetio to crash and restart. This leads to a momentary traffic interruption. If the attacker continues to send these malicious packets, it can result in a sustained DoS condition.
Conceptual Example Code
While the exact structure of the malicious packet is not detailed in the source data, the conceptual example might look something like this:
import socket
target_ip = "192.0.2.1"
target_port = 12345
# Create UDP socket
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# Craft malicious IPv4 UDP packet
malicious_packet = b'\x00' * 1024 # This is a hypothetical representation
# Send the packet
sock.sendto(malicious_packet, (target_ip, target_port))
This example is
purely conceptual
and is intended to illustrate the method of exploit, not provide a specific exploit code. The actual structure of the packet would be determined by the specific vulnerability in the target software.
