Overview
The CVE-2024-21616 vulnerability affects the Juniper Networks Junos OS, specifically impacting the Packet Forwarding Engine (PFE). If exploited, this vulnerability can allow an unauthenticated, network-based attacker to cause a Denial of Service (DoS). This vulnerability is of particular concern due to its potential for system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2024-21616
Severity: High (7.5 CVSS)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Denial of Service, potential system compromise or data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Juniper Networks Junos OS | All versions earlier than 21.2R3-S6
Juniper Networks Junos OS | 21.3 versions earlier than 21.3R3-S5
Juniper Networks Junos OS | 21.4 versions earlier than 21.4R3-S5
Juniper Networks Junos OS | 22.1 versions earlier than 22.1R3-S4
How the Exploit Works
The exploit takes advantage of an Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS. When a specific SIP packet is received and processed with SIP ALG enabled, NAT IP allocation fails for genuine traffic, causing a Denial of Service. Continuous receipt of this specific SIP ALG packet results in a sustained DoS condition.
Conceptual Example Code
The following is a
conceptual
example of how the vulnerability might be exploited. In this case, the attacker sends specific SIP ALG packets to the target system:
POST /sip/alg HTTP/1.1
Host: target.juniper.net
Content-Type: application/sdp
INVITE sip:user@target.juniper.net SIP/2.0
[vulnerability-specific SIP/ALG packet data]
