QID 44160

Date Published: 2024-01-22

QID 44160: Juniper Network Operating System (Junos OS) Denial of Service (DoS) Vulnerability (JSA75725)

Juniper Junos is the network operating system used in Juniper Networks hardware systems.

An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an attacker directly connected to the vulnerable system who repeatedly flaps DHCP subscriber sessions to cause a slow memory leak, ultimately leading to a Denial of Service (DoS).

Note: This issue only occurs if BFD liveness detection for DHCP subscribers is enabled. Systems without BFD liveness detection enabled are not vulnerable to this issue.

This issue affects Juniper Networks Junos OS on MX Series::
All versions earlier than 20.4R3-S9
21.2 versions earlier than 21.2R3-S7
21.3 versions earlier than 21.3R3-S5
21.4 versions earlier than 21.4R3-S5
22.1 versions earlier than 22.1R3-S4
22.2 versions earlier than 22.2R3-S3
22.3 versions earlier than 22.3R3-S2
22.4 versions earlier than 22.4R2-S2, 22.4R3
23.2 versions earlier than 23.2R1-S1, 23.2R2

QID detection logic: (Authenticated)

It checks for vulnerable Junos OS version.

Successful exploitation of this vulnerability by the attacker will create a sustained Denial of Service (DoS) condition.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Vendor has released patch addressing the vulnerabilities, for more information please refer JSA75725

    Workaround:
    This issue can be mitigated by disabling BFD liveness detection for DHCP subscribers. Service can be restored by manually restarting the bbe-smgd process periodically.

    Vendor References

    CVEs related to QID 44160

    Software Advisories
    Advisory ID Software Component Link
    JSA75725 URL Logo supportportal.juniper.net/JSA75725