Skip to main content

CVE-2024-21587: CWE-755 Improper Handling of Exceptional Conditions in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2024-21587cvecve-2024-21587cwe-755
Published: Fri Jan 12 2024 (01/12/2024, 00:51:30 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an attacker directly connected to the vulnerable system who repeatedly flaps DHCP subscriber sessions to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). Memory can only be recovered by manually restarting bbe-smgd. This issue only occurs if BFD liveness detection for DHCP subscribers is enabled. Systems without BFD liveness detection enabled are not vulnerable to this issue. Indication of the issue can be observed by periodically executing the 'show system processes extensive' command, which will indicate an increase in memory allocation for bbe-smgd. A small amount of memory is leaked every time a DHCP subscriber logs in, which will become visible over time, ultimately leading to memory starvation. user@junos> show system processes extensive | match bbe-smgd 13071 root 24 0 415M 201M select 0 0:41 7.28% bbe-smgd{bbe-smgd} 13071 root 20 0 415M 201M select 1 0:04 0.00% bbe-smgd{bbe-smgd} ... user@junos> show system processes extensive | match bbe-smgd 13071 root 20 0 420M 208M select 0 4:33 0.10% bbe-smgd{bbe-smgd} 13071 root 20 0 420M 208M select 0 0:12 0.00% bbe-smgd{bbe-smgd} ... This issue affects Juniper Networks Junos OS on MX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:41:19 UTC

Technical Analysis

CVE-2024-21587 is a vulnerability in Juniper Networks Junos OS specifically affecting the MX Series routers. The flaw resides in the broadband edge subscriber management daemon (bbe-smgd), which is responsible for managing DHCP subscriber sessions. When Bidirectional Forwarding Detection (BFD) liveness detection for DHCP subscribers is enabled, an attacker who has direct network access to the vulnerable system can repeatedly flap DHCP subscriber sessions. This action causes a slow memory leak within the bbe-smgd process. Over time, the leaked memory accumulates, leading to memory starvation and ultimately causing a Denial of Service (DoS) condition. The memory leak is subtle and incremental, observable by monitoring the memory usage of bbe-smgd via the 'show system processes extensive' command, which will show a gradual increase in memory allocation. The leaked memory is only recoverable by manually restarting the bbe-smgd daemon, which disrupts subscriber management services. This vulnerability affects multiple versions of Junos OS prior to specific patched releases across versions 20.4 through 23.2. The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the attack vector is adjacent network (AV:A), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild. The vulnerability is categorized under CWE-755, indicating improper handling of exceptional conditions, specifically related to resource management in the daemon.

Potential Impact

For European organizations, especially those relying on Juniper MX Series routers for broadband edge subscriber management, this vulnerability poses a risk of service disruption. The slow memory leak can degrade router performance over time, leading to denial of service conditions that interrupt DHCP subscriber session management. This can affect ISPs, telecommunications providers, and enterprises with large subscriber bases or critical network infrastructure. The impact includes potential loss of connectivity for end-users, degraded network reliability, and operational overhead due to the need for manual intervention to restart the affected daemon. Given that the attack requires adjacency (direct network access) and the presence of BFD liveness detection enabled for DHCP subscribers, the threat is more pronounced in environments where these configurations are common. Disruptions in broadband edge services can have cascading effects on business operations, customer satisfaction, and regulatory compliance, particularly in sectors with stringent uptime requirements such as finance, healthcare, and public services.

Mitigation Recommendations

1. Immediate mitigation involves disabling BFD liveness detection for DHCP subscribers if feasible, as systems without BFD enabled are not vulnerable. 2. Apply the latest Junos OS patches from Juniper Networks that address this vulnerability. Ensure all MX Series routers are updated to versions at or beyond the fixed releases (e.g., 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, etc.). 3. Implement network segmentation and access controls to limit adjacency access to the MX Series routers, reducing the attack surface. 4. Monitor the memory usage of the bbe-smgd process regularly using 'show system processes extensive' to detect early signs of memory leaks. 5. Automate alerts for abnormal memory growth in bbe-smgd to enable proactive response before service degradation occurs. 6. Prepare operational procedures for rapid restart of the bbe-smgd daemon to restore service if memory exhaustion is detected. 7. Conduct configuration reviews to ensure that only necessary features are enabled and that BFD liveness detection is used judiciously. 8. Engage with Juniper support for guidance and to verify patch applicability in complex network environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2023-12-27T19:38:25.703Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e66ba

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 2:41:19 PM

Last updated: 8/18/2025, 11:33:48 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats