Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2023-0951
Vulnerability from csaf_certbund
Published
2023-04-12 22:00
Modified
2023-04-16 22:00
Summary
Juniper Produkte: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JUNOS ist das "Juniper Network Operating System", das in Juniper Appliances verwendet wird.
Die Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren.
SRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.
Die Juniper MX-Serie ist eine Produktfamilie von Routern.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper QFX Series, Juniper SRX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper QFX Series, Juniper SRX Series und Juniper MX Series ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", title: "Angriff", }, { category: "general", text: "- BIOS/Firmware", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-0951 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0951.json", }, { category: "self", summary: "WID-SEC-2023-0951 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0951", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-JSA-Series-Apache-Commons-Text-prior-to-1-10-0-allows-RCE-when-applied-to-untrusted-input-due-to-insecure-interpolation-defaults-CVE-2022-42889?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-QFX10000-Series-PTX1000-Series-The-dcpfe-process-will-crash-when-a-malformed-ethernet-frame-is-received-CVE-2023-1697?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-QFX-Series-The-PFE-may-crash-when-a-lot-of-MAC-addresses-are-being-learned-and-aged-CVE-2023-28984?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-Evolved-Shell-Injection-vulnerability-in-the-gNOI-server-CVE-2023-28983?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-rib-sharding-scenario-when-a-route-is-frequently-updated-an-rpd-memory-leak-will-occur-CVE-2023-28982?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-If-malformed-IPv6-router-advertisements-are-received-memory-corruption-will-occur-which-causes-an-rpd-crash-CVE-2023-28981?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-rib-sharding-scenario-an-rpd-crash-will-happen-shortly-after-a-specific-CLI-command-is-issued-CVE-2023-28980?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-In-a-6PE-scenario-upon-receipt-of-a-specific-IPv6-packet-an-integrity-check-fails-CVE-2023-28979?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-Evolved-Read-access-to-some-confidential-user-information-is-possible-CVE-2023-28978?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-MX-Series-If-a-specific-traffic-rate-goes-above-the-DDoS-threshold-it-will-lead-to-an-FPC-crash-CVE-2023-28976?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-The-kernel-will-crash-when-certain-USB-devices-are-inserted-CVE-2023-28975?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-MX-Series-In-a-BBE-scenario-upon-receipt-of-specific-malformed-packets-from-subscribers-the-process-bbe-smgd-will-crash-CVE-2023-28974?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-Evolved-The-sysmanctl-shell-command-allows-a-local-user-to-gain-access-to-some-administrative-actions-CVE-2023-28973?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-NFX-Series-set-system-ports-console-insecure-allows-root-password-recovery-CVE-2023-28972?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Paragon-Active-Assurance-Enabling-the-timescaledb-enables-IP-forwarding-CVE-2023-28971?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-JRR200-Kernel-crash-upon-receipt-of-a-specific-packet-CVE-2023-28970?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-SRX-Series-Policies-that-rely-on-JDPI-Decoder-actions-may-fail-open-CVE-2023-28968?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-attacker-sending-genuine-BGP-packets-causes-an-RPD-crash-CVE-2023-28967?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-Evolved-Local-low-privileged-user-with-shell-access-can-execute-CLI-commands-as-root-CVE-2023-28966?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-QFX10002-Failure-of-storm-control-feature-may-lead-to-Denial-of-Service-CVE-2023-28965?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-flowspec-update-causes-RPD-crash-CVE-2023-28964?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-ACX-Series-IPv6-firewall-filter-is-not-installed-in-PFE-when-from-next-header-ah-is-used-CVE-2023-28961?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-Evolved-Docker-repository-is-world-writeable-allowing-low-privileged-local-user-to-inject-files-into-Docker-containers-CVE-2023-28960?language=en_US", }, { category: "external", summary: "Juniper Security Advisory vom 2023-04-12", url: "https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-QFX10002-PFE-wedges-and-restarts-upon-receipt-of-specific-malformed-packets-CVE-2023-28959?language=en_US", }, ], source_lang: "en-US", title: "Juniper Produkte: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-16T22:00:00.000+00:00", generator: { date: "2024-08-15T17:48:43.645+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-0951", initial_release_date: "2023-04-12T22:00:00.000+00:00", revision_history: [ { date: "2023-04-12T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-13T22:00:00.000+00:00", number: "2", summary: "doppelte Einträge entfernt", }, { date: "2023-04-16T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Juniper JUNOS", product: { name: "Juniper JUNOS", product_id: "5930", product_identification_helper: { cpe: "cpe:/o:juniper:junos:-", }, }, }, { category: "product_name", name: "Juniper JUNOS Evolved", product: { name: "Juniper JUNOS Evolved", product_id: "T018886", product_identification_helper: { cpe: "cpe:/o:juniper:junos:evolved", }, }, }, ], category: "product_name", name: "JUNOS", }, { category: "product_name", name: "Juniper MX Series", product: { name: "Juniper MX Series", product_id: "918766", product_identification_helper: { cpe: "cpe:/h:juniper:mx:-", }, }, }, { branches: [ { category: "product_name", name: "Juniper QFX Series", product: { name: "Juniper QFX Series", product_id: "T019810", product_identification_helper: { cpe: "cpe:/h:juniper:qfx:-", }, }, }, { category: "product_name", name: "Juniper QFX Series QFX10002", product: { name: "Juniper QFX Series QFX10002", product_id: "T027255", product_identification_helper: { cpe: "cpe:/h:juniper:qfx:qfx10002", }, }, }, { category: "product_name", name: "Juniper QFX Series QFX10000", product: { name: "Juniper QFX Series QFX10000", product_id: "T027256", product_identification_helper: { cpe: "cpe:/h:juniper:qfx:qfx10000", }, }, }, ], category: "product_name", name: "QFX Series", }, { category: "product_name", name: "Juniper SRX Series", product: { name: "Juniper SRX Series", product_id: "T008011", product_identification_helper: { cpe: "cpe:/h:juniper:srx_service_gateways:-", }, }, }, ], category: "vendor", name: "Juniper", }, ], }, vulnerabilities: [ { cve: "CVE-2023-28984", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28984", }, { cve: "CVE-2023-28983", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28983", }, { cve: "CVE-2023-28982", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28982", }, { cve: "CVE-2023-28981", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28981", }, { cve: "CVE-2023-28980", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28980", }, { cve: "CVE-2023-28979", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28979", }, { cve: "CVE-2023-28978", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28978", }, { cve: "CVE-2023-28976", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28976", }, { cve: "CVE-2023-28975", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28975", }, { cve: "CVE-2023-28974", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28974", }, { cve: "CVE-2023-28973", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28973", }, { cve: "CVE-2023-28972", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28972", }, { cve: "CVE-2023-28971", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28971", }, { cve: "CVE-2023-28970", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28970", }, { cve: "CVE-2023-28968", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28968", }, { cve: "CVE-2023-28967", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28967", }, { cve: "CVE-2023-28966", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28966", }, { cve: "CVE-2023-28965", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28965", }, { cve: "CVE-2023-28964", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28964", }, { cve: "CVE-2023-28963", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28963", }, { cve: "CVE-2023-28962", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28962", }, { cve: "CVE-2023-28961", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28961", }, { cve: "CVE-2023-28960", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28960", }, { cve: "CVE-2023-28959", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-28959", }, { cve: "CVE-2023-1697", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Juniper JUNOS, Juniper JUNOS evolved, Juniper QFX Series, Juniper SRX Series und Juniper MX Series. Die Fehler bestehen u. a. aufgrund falscher Berechtigungen, unsachgemäßer Handhabung, unsachgemäßer Überprüfungen und unsachgemäßer Authentisierungen. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T019810", "T018886", "918766", "5930", "T027256", "T008011", "T027255", ], }, release_date: "2023-04-12T22:00:00.000+00:00", title: "CVE-2023-1697", }, ], }
cve-2023-28972
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Link Resolution Before File Access vulnerability in console port access of Juniper Networks Junos OS on NFX Series allows an attacker to bypass console access controls. When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on NFX Series systems, leading to a possible administrative bypass with physical access to the console. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. This is similar to the vulnerability described in CVE-2019-0035 but affects different platforms and in turn requires a different fix. This issue affects Juniper Networks Junos OS on NFX Series: 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S12; 20.2 versions prior to 20.2R3-S8; 20.4 versions prior to 20.4R3-S7; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: 19.2 < 19.2R3-S7 Version: 19.3 < 19.3R3-S8 Version: 19.4 < 19.4R3-S12 Version: 20.2 < 20.2R3-S8 Version: 20.4 < 20.4R3-S7 Version: 21.1 < 21.1R3-S5 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S2 Version: 22.1 < 22.1R3-S1 Version: 22.2 < 22.2R2-S1, 22.2R3 Version: 22.3 < 22.3R1-S2, 22.3R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.970Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70596", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "NFX Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.2R3-S7", status: "affected", version: "19.2", versionType: "custom", }, { lessThan: "19.3R3-S8", status: "affected", version: "19.3", versionType: "custom", }, { lessThan: "19.4R3-S12", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.2R3-S8", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.4R3-S7", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S5", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S2", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3-S1", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2-S1, 22.2R3", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S2, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Juniper SIRT would like to acknowledge and thank Petri Saarenmaa from Netum for responsibly reporting this vulnerability.", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Link Resolution Before File Access vulnerability in console port access of Juniper Networks Junos OS on NFX Series allows an attacker to bypass console access controls. When \"set system ports console insecure\" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using \"set system root-authentication plain-text-password\" on NFX Series systems, leading to a possible administrative bypass with physical access to the console. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. This is similar to the vulnerability described in CVE-2019-0035 but affects different platforms and in turn requires a different fix. This issue affects Juniper Networks Junos OS on NFX Series: 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S12; 20.2 versions prior to 20.2R3-S8; 20.4 versions prior to 20.4R3-S7; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-59", description: "CWE-59 Improper Link Resolution Before File Access ('Link Following')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70596", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.2R3-S7, 19.3R3-S8, 19.4R3-S12, 20.4R3-S7, 21.1R3-S5, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70596", defect: [ "1669072", ], discovery: "EXTERNAL", }, title: "Junos OS: NFX Series: 'set system ports console insecure' allows root password recovery", workarounds: [ { lang: "en", value: "Limit console access to the device to only trusted administrators.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28972", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.970Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28963
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Authentication vulnerability in cert-mgmt.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to read arbitrary files from temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.1R3-S10 Version: 19.2 < 19.2R3-S7 Version: 19.3 < 19.3R3-S8 Version: 19.4 < 19.4R3-S11 Version: 20.1R1 < 20.1* Version: 20.2 < 20.2R3-S7 Version: 20.3R1 < 20.3* Version: 20.4 < 20.4R3-S6 Version: 21.1 < 21.1R3-S5 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S3 Version: 22.1 < 22.1R3-S1 Version: 22.2 < 22.2R2-S1, 22.2R3 Version: 22.3 < 22.3R1-S2, 22.3R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.955Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70587", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.1R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "19.2R3-S7", status: "affected", version: "19.2", versionType: "custom", }, { lessThan: "19.3R3-S8", status: "affected", version: "19.3", versionType: "custom", }, { lessThan: "19.4R3-S11", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.1*", status: "affected", version: "20.1R1", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3*", status: "affected", version: "20.3R1", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S5", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3-S1", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2-S1, 22.2R3", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S2, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Juniper SIRT would like to acknowledge and thank Zitong Wang (CataLpa) of Hatlab, DbappSecurity Co. Ltd. for responsibly reporting this vulnerability.", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Authentication vulnerability in cert-mgmt.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to read arbitrary files from temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287 Improper Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70587", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: Junos OS 19.1R3-S10, 19.2R3-S7, 19.3R3-S8, 19.4R3-S11, 20.2R3-S7, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3-S3, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70587", defect: [ "1698075", ], discovery: "EXTERNAL", }, title: "Junos OS: User-controlled input vulnerability in J-Web", workarounds: [ { lang: "en", value: "Disable J-Web, or limit access to only trusted hosts.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28963", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.955Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28959
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually restart, resulting in a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by sending a specific malformed packet to the device. Transit traffic does not trigger this issue. An indication of this issue occurring can be seen through the following log messages: fpc0 expr_hostbound_packet_handler: Receive pe 73? fpc0 Cmerror Op Set: PE Chip: PE0[0]: PGQ:misc_intr: 0x00000020: Enqueue of a packet with out-of-range VOQ in 192K-VOQ mode (URI: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL) The logs list below can also be observed when this issue occurs fpc0 Error: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL (0x210107), scope: pfe, category: functional, severity: major, module: PE Chip, type: Description for PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL fpc0 Performing action cmalarm for error /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL (0x210107) in module: PE Chip with scope: pfe category: functional level: major fpc0 Error: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE (0x21011a), scope: pfe, category: functional, severity: fatal, module: PE Chip, type: Description for PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE fpc0 Performing action cmalarm for error /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE (0x21011a) in module: PE Chip with scope: pfe category: functional level: fatal fpc0 Performing action disable-pfe for error /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE (0x21011a) in module: PE Chip with scope: pfe category: functional level: fatal This issue affects Juniper Networks Junos OS on QFX10002: All versions prior to 19.1R3-S10; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.1R3-S10 Version: 19.4 < 19.4R3-S11 Version: 20.2 < 20.2R3-S7 Version: 20.4 < 20.4R3-S6 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S2 Version: 22.1 < 22.1R3-S1 Version: 22.2 < 22.2R2-S1, 22.2R3 Version: 22.3 < 22.3R1-S2, 22.3R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.983Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70584", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "QFX10002", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.1R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "19.4R3-S11", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S2", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3-S1", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2-S1, 22.2R3", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S2, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually restart, resulting in a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by sending a specific malformed packet to the device. Transit traffic does not trigger this issue. An indication of this issue occurring can be seen through the following log messages: fpc0 expr_hostbound_packet_handler: Receive pe 73? fpc0 Cmerror Op Set: PE Chip: PE0[0]: PGQ:misc_intr: 0x00000020: Enqueue of a packet with out-of-range VOQ in 192K-VOQ mode (URI: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL) The logs list below can also be observed when this issue occurs fpc0 Error: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL (0x210107), scope: pfe, category: functional, severity: major, module: PE Chip, type: Description for PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL fpc0 Performing action cmalarm for error /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_PGQ_MISC_INT_EVENTS_ENQ_192K_VIOL (0x210107) in module: PE Chip with scope: pfe category: functional level: major fpc0 Error: /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE (0x21011a), scope: pfe, category: functional, severity: fatal, module: PE Chip, type: Description for PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE fpc0 Performing action cmalarm for error /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE (0x21011a) in module: PE Chip with scope: pfe category: functional level: fatal fpc0 Performing action disable-pfe for error /fpc/0/pfe/0/cm/0/PE_Chip/0/PECHIP_CMERROR_CM_INT_REG_DCHK_PIPE (0x21011a) in module: PE Chip with scope: pfe category: functional level: fatal This issue affects Juniper Networks Junos OS on QFX10002: All versions prior to 19.1R3-S10; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-703", description: "CWE-703 Improper Check or Handling of Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70584", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S11, 20.2R3-S7, 20.4R3-S6, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70584", defect: [ "1686793", ], discovery: "USER", }, title: "Junos OS: QFX10002: PFE wedges and restarts upon receipt of specific malformed packets", workarounds: [ { lang: "en", value: "There are no available workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28959", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.983Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28980
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (>1M routes).
This issue affects:
Juniper Networks Junos OS
* 20.2 version 20.2R3-S5 and later versions prior to 20.2R3-S6;
* 20.3 version 20.3R3-S2 and later versions prior to 20.3R3-S5;
* 20.4 version 20.4R3-S1 and later versions prior to 20.4R3-S4
* 21.1 version 21.1R3 and later versions prior to 21.1R3-S3;
* 21.2 version 21.2R1-S2, 21.2R2-S1 and later versions prior to 21.2R3-S2;
* 21.3 version 21.3R2 and later versions prior to 21.3R3;
* 21.4 versions prior to 21.4R2-S1, 21.4R3;
* 22.1 versions prior to 22.1R2.
Juniper Networks Junos OS Evolved
* 20.4-EVO version 20.4R3-S1-EVO and later versions prior to 20.4R3-S6-EVO;
* 21.2-EVO version 21.2R1-S2-EVO and later versions prior to 21.2R3-S4-EVO;
* 21.3-EVO version 21.3R2-EVO and later versions prior to 21.3R3-S1-EVO;
* 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO;
* 22.1-EVO versions prior to 22.1R2-EVO.
References
▼ | URL | Tags |
---|---|---|
https://supportportal.juniper.net/JSA70606 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: 20.2R3-S5 ≤ Version: 20.3R3-S2 ≤ Version: 20.4R3-S1 ≤ Version: 21.1R3 ≤ Version: 21.2R1-S2, 21.2R2-S1 ≤ Version: 21.3R2 ≤ Version: 21.4R1 ≤ Version: 22.1R1 ≤ |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.985Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://supportportal.juniper.net/JSA70606", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "20.2R3-S6", status: "affected", version: "20.2R3-S5", versionType: "semver", }, { lessThan: "20.3R3-S5", status: "affected", version: "20.3R3-S2", versionType: "semver", }, { lessThan: "20.4R3-S4", status: "affected", version: "20.4R3-S1", versionType: "semver", }, { lessThan: "21.1R3-S3", status: "affected", version: "21.1R3", versionType: "semver", }, { lessThan: "21.2R3-S2", status: "affected", version: "21.2R1-S2, 21.2R2-S1", versionType: "semver", }, { lessThan: "21.3R3", status: "affected", version: "21.3R2", versionType: "semver", }, { lessThan: "21.4R2-S1, 21.4R3", status: "affected", version: "21.4R1", versionType: "semver", }, { lessThan: "22.1R2", status: "affected", version: "22.1R1", versionType: "semver", }, ], }, { defaultStatus: "unaffected", product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "20.4R3-S6-EVO", status: "affected", version: "20.4R3-S1-EVO", versionType: "semver", }, { lessThan: "21.2R3-S4-EVO", status: "affected", version: "21.2R1-S2-EVO", versionType: "semver", }, { lessThan: "21.3R3-S1-EVO", status: "affected", version: "21.3R2-EVO", versionType: "semver", }, { lessThan: "21.4R2-S1-EVO, 21.4R3-EVO", status: "affected", version: "21.4R1-EVO", versionType: "semver", }, { lessThan: "22.1R2-EVO", status: "affected", version: "22.1R1-EVO", versionType: "semver", }, ], }, ], configurations: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>To be exposed to this issue the system needs to be configured with rib sharding as follows:</p><code> [system processes routing bgp rib-sharding]</code><br/>", }, ], value: "To be exposed to this issue the system needs to be configured with rib sharding as follows:\n\n [system processes routing bgp rib-sharding]\n", }, ], datePublic: "2023-04-12T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (>1M routes).<br></p><p>This issue affects:<br>Juniper Networks Junos OS<br></p><ul><li>20.2 version 20.2R3-S5 and later versions prior to 20.2R3-S6;</li><li>20.3 version 20.3R3-S2 and later versions prior to 20.3R3-S5;</li><li>20.4 version 20.4R3-S1 and later versions prior to 20.4R3-S4</li><li>21.1 version 21.1R3 and later versions prior to 21.1R3-S3;</li><li>21.2 version 21.2R1-S2, 21.2R2-S1 and later versions prior to 21.2R3-S2;</li><li>21.3 version 21.3R2 and later versions prior to 21.3R3;</li><li>21.4 versions prior to 21.4R2-S1, 21.4R3;</li><li>22.1 versions prior to 22.1R2.</li></ul><p></p><p>Juniper Networks Junos OS Evolved<br></p><ul><li>20.4-EVO version 20.4R3-S1-EVO and later versions prior to 20.4R3-S6-EVO;</li><li>21.2-EVO version 21.2R1-S2-EVO and later versions prior to 21.2R3-S4-EVO;</li><li>21.3-EVO version 21.3R2-EVO and later versions prior to 21.3R3-S1-EVO;</li><li>21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO;</li><li>22.1-EVO versions prior to 22.1R2-EVO.</li></ul>", }, ], value: "A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (>1M routes).\n\n\nThis issue affects:\nJuniper Networks Junos OS\n\n\n * 20.2 version 20.2R3-S5 and later versions prior to 20.2R3-S6;\n * 20.3 version 20.3R3-S2 and later versions prior to 20.3R3-S5;\n * 20.4 version 20.4R3-S1 and later versions prior to 20.4R3-S4\n * 21.1 version 21.1R3 and later versions prior to 21.1R3-S3;\n * 21.2 version 21.2R1-S2, 21.2R2-S1 and later versions prior to 21.2R3-S2;\n * 21.3 version 21.3R2 and later versions prior to 21.3R3;\n * 21.4 versions prior to 21.4R2-S1, 21.4R3;\n * 22.1 versions prior to 22.1R2.\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n * 20.4-EVO version 20.4R3-S1-EVO and later versions prior to 20.4R3-S6-EVO;\n * 21.2-EVO version 21.2R1-S2-EVO and later versions prior to 21.2R3-S4-EVO;\n * 21.3-EVO version 21.3R2-EVO and later versions prior to 21.3R3-S1-EVO;\n * 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO;\n * 22.1-EVO versions prior to 22.1R2-EVO.\n\n\n", }, ], exploits: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>", }, ], value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-08-28T23:49:43.170Z", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { tags: [ "vendor-advisory", ], url: "https://supportportal.juniper.net/JSA70606", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>The following software releases have been updated to resolve this specific issue:</p><p>Junos OS Evolved: 20.4R3-S6-EVO, 21.2R3-S4-EVO, 21.3R3-S1-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases.</p><p>Junos OS: 20.2R3-S6, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.</p>", }, ], value: "The following software releases have been updated to resolve this specific issue:\n\nJunos OS Evolved: 20.4R3-S6-EVO, 21.2R3-S4-EVO, 21.3R3-S1-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases.\n\nJunos OS: 20.2R3-S6, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.\n\n", }, ], source: { advisory: "JSA70606", defect: [ "1658834", ], discovery: "USER", }, timeline: [ { lang: "en", time: "2023-04-12T16:00:00.000Z", value: "Initial Publication", }, ], title: "Junos OS and Junos OS Evolved: In a BGP rib sharding scenario an rpd crash will happen shortly after a specific CLI command is issued", workarounds: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>There are no known workarounds for this issue.</p><p>To reduce the risk of exploitation use access controls to limit CLI access to the device only from trusted networks, hosts and users.</p>", }, ], value: "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation use access controls to limit CLI access to the device only from trusted networks, hosts and users.\n\n", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28980", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.985Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28983
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS Evolved |
Version: 21.4R1-EVO < 21.4* Version: 22.1 < 22.1R1-EVO |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:39.128Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70609", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "21.4*", status: "affected", version: "21.4R1-EVO", versionType: "custom", }, { lessThan: "22.1R1-EVO", status: "affected", version: "22.1", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78 OS Command Injection", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70609", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 22.2R1-EVO, 22.3R1-EVO, and all subsequent releases.\n", }, ], source: { advisory: "JSA70609", defect: [ "1662750", ], discovery: "INTERNAL", }, title: "Junos OS Evolved: Shell Injection vulnerability in the gNOI server", workarounds: [ { lang: "en", value: "To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted administrative networks, hosts and users.\n", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28983", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:39.128Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28961
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Juniper Networks Junos OS on the ACX Series devices will prevent a firewall filter with the term 'from next-header ah' from being properly installed in the packet forwarding engine (PFE). There is no immediate indication of an incomplete firewall filter commit shown at the CLI, which could allow an attacker to send valid packets to or through the device that were explicitly intended to be dropped. An indication that the filter was not installed can be identified with the following logs: fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_rule_prepare : Config failed: Unsupported Ip-protocol 51 in the filter lo0.0-inet6-i fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_rule_prepare : Please detach the filter, remove unsupported match and re-attach fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_process_rule : Status:104 dnx_dfw_rule_prepare failed fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_process_filter : Status:104 dnx_dfw_process_rule failed fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_update_filter_in_hw : Status:104 Could not process filter(lo0.0-inet6-i) for rule expansion Unsupported match, action present. fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_create_hw_instance : Status:104 Could not program dfw(lo0.0-inet6-i) type(IFP_DFLT_INET6_Lo0_FILTER)! [104] fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_bind_shim : [104] Could not create dfw(lo0.0-inet6-i) type(IFP_DFLT_INET6_Lo0_FILTER) fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_update_resolve : [100] Failed to bind filter(3) to bind point fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_change_end : dnx_dfw_update_resolve (resolve type) failed This issue affects Juniper Networks Junos OS on ACX Series: All versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 20.2R3-S7 Version: 20.4 < 20.4R3-S4 Version: 21.1 < 21.1R3-S3 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3 Version: 21.4 < 21.4R3 Version: 22.1 < 22.1R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.860Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70586", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "ACX Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "20.2R3-S7", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.4R3-S4", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S3", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2", status: "affected", version: "22.1", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "This issue affects systems with stateless firewall filters configured as follows:\n\n set firewall family inet6 filter <filter-name> term <term-name> from next-header ah\n", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Juniper Networks Junos OS on the ACX Series devices will prevent a firewall filter with the term 'from next-header ah' from being properly installed in the packet forwarding engine (PFE). There is no immediate indication of an incomplete firewall filter commit shown at the CLI, which could allow an attacker to send valid packets to or through the device that were explicitly intended to be dropped. An indication that the filter was not installed can be identified with the following logs: fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_rule_prepare : Config failed: Unsupported Ip-protocol 51 in the filter lo0.0-inet6-i fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_rule_prepare : Please detach the filter, remove unsupported match and re-attach fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_process_rule : Status:104 dnx_dfw_rule_prepare failed fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_process_filter : Status:104 dnx_dfw_process_rule failed fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_update_filter_in_hw : Status:104 Could not process filter(lo0.0-inet6-i) for rule expansion Unsupported match, action present. fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_create_hw_instance : Status:104 Could not program dfw(lo0.0-inet6-i) type(IFP_DFLT_INET6_Lo0_FILTER)! [104] fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_bind_shim : [104] Could not create dfw(lo0.0-inet6-i) type(IFP_DFLT_INET6_Lo0_FILTER) fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_update_resolve : [100] Failed to bind filter(3) to bind point fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_change_end : dnx_dfw_update_resolve (resolve type) failed This issue affects Juniper Networks Junos OS on ACX Series: All versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-241", description: "CWE-241 Improper Handling of Unexpected Data Type", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70586", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 20.2R3-S7, 20.4R3-S4, 21.1R3-S3, 21.2R3-S4, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70586", defect: [ "1653475", ], discovery: "USER", }, title: "Junos OS: ACX Series: IPv6 firewall filter is not installed in PFE when \"from next-header ah\" is used", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28961", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.860Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-1697
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 05:57
Severity ?
EPSS score ?
Summary
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a specific malformed ethernet frame is received. This issue affects Juniper Networks Junos OS on QFX10000 Series, PTX1000 Series Series: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.4R3-S10 Version: 20.1R1 < 20.1* Version: 20.2 < 20.2R3-S6 Version: 20.3 < 20.3R3-S6 Version: 20.4 < 20.4R3-S5 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3-S3 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S1 Version: 22.1 < 22.1R2-S1, 22.1R3 Version: 22.2 < 22.2R1-S2, 22.2R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:57:24.934Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70612", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "QFX10000 Series, PTX1000 Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.4R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.1*", status: "affected", version: "20.1R1", versionType: "custom", }, { lessThan: "20.2R3-S6", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R3-S6", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S5", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S3", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S1", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2-S1, 22.1R3", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R1-S2, 22.2R2", status: "affected", version: "22.2", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a specific malformed ethernet frame is received. This issue affects Juniper Networks Junos OS on QFX10000 Series, PTX1000 Series Series: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-230", description: "CWE-230 Improper Handling of Missing Values", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70612", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S10, 20.2R3-S6, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S3, 21.4R3-S1, 22.1R2-S1, 22.1R3, 22.2R1-S2, 22.2R2, 22.3R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70612", defect: [ "1667678", ], discovery: "USER", }, title: "Junos OS: QFX10000 Series, PTX1000 Series: The dcpfe process will crash when a malformed ethernet frame is received", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-1697", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T05:57:24.934Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28975
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS). When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. The device will continue to crash as long as the USB device is connected. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2, 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2; 22.4 versions prior to 22.4R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.4R3-S10 Version: 20.2 < 20.2R3-S7 Version: 20.3 < 20.3R3-S6 Version: 20.4 < 20.4R3-S5 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S2 Version: 22.1 < 22.1R2-S2, 22.1R3 Version: 22.2 < 22.2R2 Version: 22.3 < 22.3R1-S1, 22.3R2 Version: 22.4 < 22.4R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.773Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70600", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.4R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R3-S6", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S5", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S2", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2-S2, 22.1R3", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S1, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, { lessThan: "22.4R2", status: "affected", version: "22.4", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS). When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. The device will continue to crash as long as the USB device is connected. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2, 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2; 22.4 versions prior to 22.4R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-394", description: "CWE-394 Unexpected Status Code or Return Value", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70600", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S10, 20.2R3-S7, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R2-S2, 22.1R3, 22.2R2, 22.3R1-S1, 22.3R2, 22.4R2, 23.1R1, and all subsequent releases.", }, ], source: { advisory: "JSA70600", defect: [ "1638519", ], discovery: "USER", }, title: "Junos OS: The kernel will crash when certain USB devices are inserted", workarounds: [ { lang: "en", value: "To reduce the risk of exploitation utilize common security BCPs to limit physical access to the devices..", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28975", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.773Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28971
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects customers hosting their own on-prem Control Center. The Paragon Active Assurance Software as a Service (SaaS) is not affected by this vulnerability since the timescaledb service is not enabled. This issue affects all on-prem versions of Juniper Networks Paragon Active Assurance prior to 4.1.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Paragon Active Assurance |
Version: unspecified < 4.1.2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.922Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70595", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Paragon Active Assurance", vendor: "Juniper Networks", versions: [ { lessThan: "4.1.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects customers hosting their own on-prem Control Center. The Paragon Active Assurance Software as a Service (SaaS) is not affected by this vulnerability since the timescaledb service is not enabled. This issue affects all on-prem versions of Juniper Networks Paragon Active Assurance prior to 4.1.2.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-923", description: "CWE-923 Improper Restriction of Communication Channel to Intended Endpoints", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70595", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 4.1.2, 4.2.0, and all subsequent releases.", }, ], source: { advisory: "JSA70595", defect: [ "PAALS-1134", ], discovery: "USER", }, title: "Paragon Active Assurance: Enabling the timescaledb enables IP forwarding", workarounds: [ { lang: "en", value: "If the timescaledb feature is not used - disable the service and disable IP forwarding.\n root@ncc:~# systemctl stop netrounds-timescaledb\n root@ncc:~# systemctl disable netrounds-timescaledb\n root@ncc:~# echo 0 > /proc/sys/net/ipv4/ip_forward\n\nIn case timescaledb feature is used - drop forwarded packets by changing default forward policy to drop packets:\n\nStop running services, to clear dynamic rules\n ncc services stop openvpn metrics timescaledb\n\nSet default DROP policy for forwarding\n iptables -P FORWARD DROP\n ip6tables -P FORWARD DROP\n\nInstall iptables-persistent and save rules\n apt-get install iptables-persistent\n iptables-save > /etc/iptables/rules.v4\n ip6tables-save > /etc/iptables/rules.v6\n\nRestart services\n ncc services start openvpn metrics timescaledb\n \n\n", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28971", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.922Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28962
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.4R3-S11 Version: 20.1R1 < 20.1* Version: 20.2 < 20.2R3-S7 Version: 20.3R1 < 20.3* Version: 20.4 < 20.4R3-S6 Version: 21.1R1 < 21.1* Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S3 Version: 22.1 < 22.1R3-S1 Version: 22.2 < 22.2R2-S1, 22.2R3 Version: 22.3 < 22.3R1-S2, 22.3R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.763Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70587", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.4R3-S11", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.1*", status: "affected", version: "20.1R1", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3*", status: "affected", version: "20.3R1", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1*", status: "affected", version: "21.1R1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3-S1", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2-S1, 22.2R3", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S2, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Juniper SIRT would like to acknowledge and thank Zitong Wang (CataLpa) of Hatlab, DbappSecurity Co. Ltd. for responsibly reporting this vulnerability.", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287 Improper Authentication", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70587", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: Junos OS 19.4R3-S11, 20.2R3-S7, 20.4R3-S6, 21.2R3-S4, 21.3R3-S3, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, 22.4R2, 23.1R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70587", defect: [ "1698072", ], discovery: "EXTERNAL", }, title: "Junos OS: Unauthenticated access vulnerability in J-Web", workarounds: [ { lang: "en", value: "Disable J-Web, or limit access to only trusted hosts.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28962", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.763Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28967
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Juniper Networks | Junos OS |
Patch: unspecified Version: 21.1R1 < 21.1* Version: 21.2R1 < 21.2* Version: 21.3R1 < 21.3* Version: 21.4 < 21.4R3 Version: 22.1 < 22.1R3 Version: 22.2 < 22.2R2 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.962Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70591", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "21.1R1", status: "unaffected", version: "unspecified", versionType: "custom", }, { changes: [ { at: "21.1R3-S5", status: "unaffected", }, ], lessThan: "21.1*", status: "affected", version: "21.1R1", versionType: "custom", }, { changes: [ { at: "21.2R3-S2", status: "unaffected", }, ], lessThan: "21.2*", status: "affected", version: "21.2R1", versionType: "custom", }, { changes: [ { at: "21.3R3-S2", status: "unaffected", }, ], lessThan: "21.3*", status: "affected", version: "21.3R1", versionType: "custom", }, { lessThan: "21.4R3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2", status: "affected", version: "22.2", versionType: "custom", }, ], }, { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "21.1R1-EVO", status: "unaffected", version: "unspecified", versionType: "custom", }, { lessThan: "21.1-EVO*", status: "affected", version: "21.1R1-EVO", versionType: "custom", }, { lessThan: "21.4R3-EVO", status: "affected", version: "21.4-EVO", versionType: "custom", }, { lessThan: "22.1R3-EVO", status: "affected", version: "22.1-EVO", versionType: "custom", }, { lessThan: "22.2R2-EVO", status: "affected", version: "22.2-EVO", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "The following minimal configuration is required:\n\n [protocols bgp]", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, { descriptions: [ { cweId: "CWE-908", description: "CWE-908: Use of Uninitialized Resource", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70591", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 21.1R3-S5, 21.2R3-S2, 21.3R3-S2, 21.4R3, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases.\n\nJunos OS Evolved: 21.4R3-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, and all subsequent releases.", }, ], source: { advisory: "JSA70591", defect: [ "1673833", ], discovery: "USER", }, title: "Junos OS and Junos OS Evolved: An attacker sending genuine BGP packets causes an RPD crash", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue. \n\nTo reduce the risk of exploitation utilize common security BCPs to limit the exploitable surface by disallowing access to all BGP services on networks and devices to only trusted systems, administrators, networks and hosts.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28967", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.962Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28964
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Upon receipt of a malformed BGP flowspec update, RPD will crash resulting in a Denial of Service. This issue affects Juniper Networks Junos OS: All versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2; Juniper Networks Junos OS Evolved: All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R2-EVO; 20.3 versions prior to 20.3R2-EVO;
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 18.1R3-S11 Version: 18.2 < 18.2R3-S6 Version: 18.3 < 18.3R3-S4 Version: 18.4 < 18.4R3-S6 Version: 19.1 < 19.1R3-S4 Version: 19.2 < 19.2R3-S1 Version: 19.3 < 19.3R3-S1 Version: 19.4 < 19.4R3 Version: 20.1 < 20.1R2 Version: 20.2 < 20.2R2 Version: 20.3 < 20.3R1-S1, 20.3R2 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.988Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70588", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "18.1R3-S11", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "18.2R3-S6", status: "affected", version: "18.2", versionType: "custom", }, { lessThan: "18.3R3-S4", status: "affected", version: "18.3", versionType: "custom", }, { lessThan: "18.4R3-S6", status: "affected", version: "18.4", versionType: "custom", }, { lessThan: "19.1R3-S4", status: "affected", version: "19.1", versionType: "custom", }, { lessThan: "19.2R3-S1", status: "affected", version: "19.2", versionType: "custom", }, { lessThan: "19.3R3-S1", status: "affected", version: "19.3", versionType: "custom", }, { lessThan: "19.4R3", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.1R2", status: "affected", version: "20.1", versionType: "custom", }, { lessThan: "20.2R2", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R1-S1, 20.3R2", status: "affected", version: "20.3", versionType: "custom", }, ], }, { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "20.1R3-EVO", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.2R2-EVO", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R2-EVO", status: "affected", version: "20.3", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Upon receipt of a malformed BGP flowspec update, RPD will crash resulting in a Denial of Service. This issue affects Juniper Networks Junos OS: All versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2; Juniper Networks Junos OS Evolved: All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R2-EVO; 20.3 versions prior to 20.3R2-EVO;", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-130", description: "CWE-130 Improper Handling of Length Parameter Inconsistency ", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70588", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 18.1R3-S11, 18.2R3-S6, 18.3R3-S4, 18.4R3-S6, 19.1R3-S4, 19.2R3-S1, 19.3R3-S1, 19.4R3, 20.1R2, 20.2R2, 20.3R1-S1, 20.3R2, 20.4R1, and all subsequent releases.\nJunos OS Evolved: 20.1R3-EVO, 20.2R2-EVO, 20.3R2-EVO, 20.4R1-EVO, and all subsequent releases.", }, ], source: { advisory: "JSA70588", defect: [ "1535740", ], discovery: "INTERNAL", }, title: "Junos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28964", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.988Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28960
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system. A follow-on administrator could then inadvertently start the Docker container leading to the malicious files being executed as root. This issue only affects systems with Docker configured and enabled, which is not enabled by default. Systems without Docker started are not vulnerable to this issue. This issue affects Juniper Networks Junos OS Evolved: 20.4 versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 19.2R1-EVO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS Evolved |
Patch: unspecified Version: 20.4 < 20.4R3-S5-EVO Version: 21.2 < 21.2R3-EVO Version: 21.3 < 21.3R3-EVO Version: 21.4 < 21.4R2-EVO |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.948Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70585", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "19.2R1-EVO", status: "unaffected", version: "unspecified", versionType: "custom", }, { lessThan: "20.4R3-S5-EVO", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.2R3-EVO", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-EVO", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R2-EVO", status: "affected", version: "21.4", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "Docker is started on Junos OS Evolved using the following command:\n\n root@evo# systemctl start docker@vrf0\n\nLikewise, the status of Docker running on the system can be confirmed using the following command:\n\n root@evo# systemctl status docker\n * docker.service - Docker Application Container Engine\n Loaded: loaded (/lib/systemd/system/docker.service; disabled; vendor preset: enabled)\n Active: active (running) since Tue 2023-04-11 14:44:29 PDT; 6s ago\n ...\n", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system. A follow-on administrator could then inadvertently start the Docker container leading to the malicious files being executed as root. This issue only affects systems with Docker configured and enabled, which is not enabled by default. Systems without Docker started are not vulnerable to this issue. This issue affects Juniper Networks Junos OS Evolved: 20.4 versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 19.2R1-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-732", description: "CWE-732 Incorrect Permission Assignment for Critical Resource", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70585", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S5-EVO, 21.2R3-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R1-EVO, and all subsequent releases.\n", }, ], source: { advisory: "JSA70585", defect: [ "1621554", ], discovery: "INTERNAL", }, title: "Junos OS Evolved: Docker repository is world-writeable, allowing low-privileged local user to inject files into Docker containers", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28960", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.948Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28970
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing on the network interfaces of Juniper Networks Junos OS on JRR200 route reflector appliances allows an adjacent, network-based attacker sending a specific packet to the device to cause a kernel crash, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by an attacker on the local broadcast domain. Packets routed to the device are unable to trigger this crash. This issue affects Juniper Networks Junos OS on JRR200: All versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S4; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S2, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2; 22.4 versions prior to 22.4R1-S1, 22.4R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 21.2R3-S4 Version: 21.3 < 21.3R3-S4 Version: 21.4 < 21.4R3-S3 Version: 22.1 < 22.1R3-S1 Version: 22.2 < 22.2R2-S2, 22.2R3 Version: 22.3 < 22.3R1-S2, 22.3R2 Version: 22.4 < 22.4R1-S1, 22.4R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.981Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70594", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "JRR200", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "21.2R3-S4", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "21.3R3-S4", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3-S1", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2-S2, 22.2R3", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S2, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, { lessThan: "22.4R1-S1, 22.4R2", status: "affected", version: "22.4", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing on the network interfaces of Juniper Networks Junos OS on JRR200 route reflector appliances allows an adjacent, network-based attacker sending a specific packet to the device to cause a kernel crash, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by an attacker on the local broadcast domain. Packets routed to the device are unable to trigger this crash. This issue affects Juniper Networks Junos OS on JRR200: All versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S4; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S2, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2; 22.4 versions prior to 22.4R1-S1, 22.4R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-703", description: "CWE-703 Improper Check or Handling of Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70594", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: Junos OS 21.2R3-S4, 21.4R3-S3, 22.1R3-S1, 22.2R2-S2, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1-S1, 22.4R2, 23.1R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70594", defect: [ "1677503", ], discovery: "USER", }, title: "Junos OS: JRR200: Kernel crash upon receipt of a specific packet", workarounds: [ { lang: "en", value: "Limit direct access to the device to only from trusted hosts and administrators.\n", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28970", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.981Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28968
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix <address/mask> extensive Session ID: <session ID>, Status: Normal, State: Active Policy name: <name of policy> Dynamic application: junos:UNKNOWN, <<<<< LOOK HERE Please note, the JDPI-Decoder and the AppID SigPack are both affected and both must be upgraded along with the operating system to address the matter. By default, none of this is auto-enabled for automatic updates. This issue affects: Juniper Networks any version of the JDPI-Decoder Engine prior to version 5.7.0-47 with the JDPI-Decoder enabled using any version of the AppID SigPack prior to version 1.550.2-31 (SigPack 3533) on Junos OS on SRX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2;
References
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.1R3-S10 Version: 19.2 < 19.2R3-S7 Version: 19.3 < 19.3R3-S8 Version: 19.4 < 19.4R3-S11 Version: 20.1R1 < 20.1* Version: 20.2 < 20.2R3-S7 Version: 20.3R1 < 20.3* Version: 20.4 < 20.4R3-S6 Version: 21.1 < 21.1R3-S5 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S3 Version: 22.1 < 22.1R3-S1 Version: 22.2 < 22.2R2-S1, 22.2R3 Version: 22.3 < 22.3R2 |
||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.825Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70592", }, { tags: [ "x_transferred", ], url: "https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf", }, { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "SRX Series", ], product: " Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.1R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "19.2R3-S7", status: "affected", version: "19.2", versionType: "custom", }, { lessThan: "19.3R3-S8", status: "affected", version: "19.3", versionType: "custom", }, { lessThan: "19.4R3-S11", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.1*", status: "affected", version: "20.1R1", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3*", status: "affected", version: "20.3R1", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S5", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3-S1", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2-S1, 22.2R3", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R2", status: "affected", version: "22.3", versionType: "custom", }, ], }, { platforms: [ "SRX Series", ], product: "AppID Service Sigpack", vendor: "Juniper Networks", versions: [ { lessThan: "1.550.2-31", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { platforms: [ "SRX Series", ], product: "JDPI-Decoder Engine", vendor: "Juniper Networks", versions: [ { lessThan: "5.7.0-47", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "\nFor this issue, Security Policy with dynamic application must be configured:\n \n [security zones security-zone trust]\n [security zones security-zone untrust]\n [security policies from-zone “zone” to-zone “zone” policy “policy” match source-address “address”]\n [security policies from-zone “zone” to-zone “zone” policy “policy” match destination-address “address”]\n [security policies from-zone “zone” to-zone “zone” policy “policy” match dynamic-application “application”]\n [security policies from-zone “zone” to-zone “zone” policy “policy” then “action”]", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix <address/mask> extensive Session ID: <session ID>, Status: Normal, State: Active Policy name: <name of policy> Dynamic application: junos:UNKNOWN, <<<<< LOOK HERE Please note, the JDPI-Decoder and the AppID SigPack are both affected and both must be upgraded along with the operating system to address the matter. By default, none of this is auto-enabled for automatic updates. This issue affects: Juniper Networks any version of the JDPI-Decoder Engine prior to version 5.7.0-47 with the JDPI-Decoder enabled using any version of the AppID SigPack prior to version 1.550.2-31 (SigPack 3533) on Junos OS on SRX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2;", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1325", description: "CWE-1325: Improperly Controlled Sequential Memory Allocation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70592", }, { url: "https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf", }, { url: "https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S11, 20.2R3-S7, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3-S3, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\nPlease note: Prior to Junos OS: 21.2R3-S4, 21.3R3-S3, 21.3R3-S3, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R2, 22.4R1, and all subsequent releases SOF is incorrectly offloading short-lived flows leading to early exhaustion of NP memory, reducing overall device performance. Customers should review PRSearch PR1692100 for such details in conjunction with this advisory.\n\n\nCustomers may choose to enable automatic updates for IDP or manually update the IDP security package to receive the fixes. \n\nTo manually download the IDP signatures: \na. Download the IDP security-package on the device:\n request security idp security-package download\nb. Check the status of the download:\n request security idp security-package download status\nc. Install the IDP security-package on the device:\n request security idp security-package install\nd. Check the status of the installation:\n request security idp security-package install status\n\nTo enabled automatic update review the instuctions located at: https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX\n\n== When using AppID only:\n \n request services application-identification download\n request services application-identification download status\n request services application-identification install\n request services application-identification install status\n \nOr enable auto-update for AppID:\n \n [edit]\n user# set services application-identification download automatic ?\n Possible completions:\n interval Attempt to download new application package (hours)\n start-time Start time(MM-DD.hh:mm / YYYY-MM-DD.hh:mm:ss)\n \nNote: This updated signature package is not compatible with v4 engines.\n\n\n", }, ], source: { advisory: "JSA70592", defect: [ "1694222", ], discovery: "USER", }, title: "Junos OS: SRX Series: Policies that rely on JDPI-Decoder actions may fail open", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue other than disabling the AppID service.\n\nAdditionally, a reboot will temporarily clear the problem until such time that updates can be taken. How long this lasts depends on the customer's network environment and the device being affected.\n\n\n", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28968", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.825Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28973
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability. Administrative functions such as daemon restarting, routing engine (RE) switchover, and node shutdown can all be performed through exploitation of the 'sysmanctl' command. Access to the 'sysmanctl' command is only available from the Junos shell. Neither direct nor indirect access to 'sysmanctl' is available from the Junos CLI. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO; 21.4 versions prior to 21.4R1-S2-EVO, 21.4R2-EVO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS Evolved |
Version: unspecified < 20.4R3-S5-EVO Version: 21.2 < 21.2R3-EVO Version: 21.3 < 21.3R2-EVO Version: 21.4 < 21.4R1-S2-EVO, 21.4R2-EVO |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:39.001Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70597", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "20.4R3-S5-EVO", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "21.2R3-EVO", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R2-EVO", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R1-S2-EVO, 21.4R2-EVO", status: "affected", version: "21.4", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability. Administrative functions such as daemon restarting, routing engine (RE) switchover, and node shutdown can all be performed through exploitation of the 'sysmanctl' command. Access to the 'sysmanctl' command is only available from the Junos shell. Neither direct nor indirect access to 'sysmanctl' is available from the Junos CLI. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO; 21.4 versions prior to 21.4R1-S2-EVO, 21.4R2-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "CWE-285 Improper Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70597", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S5-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S2-EVO, 21.4R2-EVO, 22.1R1-EVO, and all subsequent releases.\n", }, ], source: { advisory: "JSA70597", defect: [ "1621545", ], discovery: "INTERNAL", }, title: "Junos OS Evolved: The 'sysmanctl' shell command allows a local user to gain access to some administrative actions ", workarounds: [ { lang: "en", value: "Limit access to the Junos shell through the use of command authorization to only trusted system administrators.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28973", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:39.001Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28965
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Check or Handling of Exceptional Conditions within the storm control feature of Juniper Networks Junos OS allows an attacker sending a high rate of traffic to cause a Denial of Service. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Storm control monitors the level of applicable incoming traffic and compares it with the level specified. If the combined level of the applicable traffic exceeds the specified level, the switch drops packets for the controlled traffic types. This issue affects Juniper Networks Junos OS on QFX10002: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.3R3-S7 Version: 19.4 < 19.4R3-S11 Version: 20.2 < 20.2R3-S6 Version: 20.4 < 20.4R3-S5 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3-S3 Version: 21.3 < 21.3R3 Version: 21.4 < 21.4R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:39.130Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70589", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "QFX10002", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.3R3-S7", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "19.4R3-S11", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.2R3-S6", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.4R3-S5", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S3", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R2", status: "affected", version: "21.4", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "The following provides an example of an affected configuration: \n\n set interfaces xe-0/0/14:0 unit 0 family ethernet-switching interface-mode trunk\n set interfaces xe-0/0/14:0 unit 0 family ethernet-switching vlan members v100\n set interfaces xe-0/0/14:0 unit 0 family ethernet-switching storm-control storm\n set forwarding-options storm-control-profiles default all\n set forwarding-options storm-control-profiles storm all bandwidth-level 100\n set forwarding-options storm-control-profiles storm action-shutdown\n set protocols lldp interface all\n set vlans v100 vlan-id 100", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Check or Handling of Exceptional Conditions within the storm control feature of Juniper Networks Junos OS allows an attacker sending a high rate of traffic to cause a Denial of Service. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Storm control monitors the level of applicable incoming traffic and compares it with the level specified. If the combined level of the applicable traffic exceeds the specified level, the switch drops packets for the controlled traffic types. This issue affects Juniper Networks Junos OS on QFX10002: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-703", description: "CWE-703 Improper Check or Handling of Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70589", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R3-S11, 20.2R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3, 21.4R2, 22.1R1 and all subsequent releases.\n", }, ], source: { advisory: "JSA70589", defect: [ "1619359", ], discovery: "INTERNAL", }, title: "Junos OS: QFX10002: Failure of storm control feature may lead to Denial of Service", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28965", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:39.130Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28974
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the bbe-smgd of Juniper Networks Junos OS allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). In a Broadband Edge / Subscriber Management scenario on MX Series when a specifically malformed ICMP packet addressed to the device is received from a subscriber the bbe-smgd will crash, affecting the subscriber sessions that are connecting, updating, or terminating. Continued receipt of such packets will lead to a sustained DoS condition. When this issue happens the below log can be seen if the traceoptions for the processes smg-service are enabled: BBE_TRACE(TRACE_LEVEL_INFO, "%s: Dropped unsupported ICMP PKT ... This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R1-S2, 22.3R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.4R3-S11 Version: 20.2 < 20.2R3-S7 Version: 20.3 < 20.3R3-S6 Version: 20.4 < 20.4R3-S6 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3-S2 Version: 22.1 < 22.1R2-S2, 22.1R3 Version: 22.2 < 22.2R2 Version: 22.3 < 22.3R1-S2, 22.3R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.840Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70599", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "MX Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.4R3-S11", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R3-S6", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3-S2", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2-S2, 22.1R3", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2", status: "affected", version: "22.2", versionType: "custom", }, { lessThan: "22.3R1-S2, 22.3R2", status: "affected", version: "22.3", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "To be exposed to this vulnerability subscriber management needs to be enabled via:\n\n [system services subscriber-management enable]", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the bbe-smgd of Juniper Networks Junos OS allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). In a Broadband Edge / Subscriber Management scenario on MX Series when a specifically malformed ICMP packet addressed to the device is received from a subscriber the bbe-smgd will crash, affecting the subscriber sessions that are connecting, updating, or terminating. Continued receipt of such packets will lead to a sustained DoS condition. When this issue happens the below log can be seen if the traceoptions for the processes smg-service are enabled: BBE_TRACE(TRACE_LEVEL_INFO, \"%s: Dropped unsupported ICMP PKT ... This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R1-S2, 22.3R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-754", description: "CWE-754 Improper Check for Unusual or Exceptional Conditions", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70599", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S11, 20.2R3-S7, 20.3R3-S6, 20.4R3-S6, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R2-S2, 22.1R3, 22.2R2, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70599", defect: [ "1681389", ], discovery: "USER", }, title: "Junos OS: MX Series: In a BBE scenario upon receipt of specific malformed packets from subscribers the process bbe-smgd will crash", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28974", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.840Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28979
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check. In a 6PE scenario and if an additional integrity check is configured, it will fail to drop specific malformed IPv6 packets, and then these packets will be forwarded to other connected networks. This issue affects Juniper Networks Junos OS: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.3R3-S7 Version: 19.4 < 19.4R3-S9 Version: 20.2 < 20.2R3-S7 Version: 20.3 < 20.3R3-S5 Version: 20.4 < 20.4R3-S4 Version: 21.1 < 21.1R3-S3 Version: 21.2 < 21.2R3-S2 Version: 21.3 < 21.3R3-S1 Version: 21.4 < 21.4R2-S1, 21.4R3 Version: 22.1 < 22.1R2 Version: 22.2 < 22.2R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.950Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70604", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.3R3-S7", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "19.4R3-S9", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R3-S5", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S4", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S3", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S2", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S1", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R2-S1, 21.4R3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2", status: "affected", version: "22.2", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "For a system to be affected it would need to be configured for 6PE where the following command is required:\n\n [protocols mpls ipv6-tunneling]", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check. In a 6PE scenario and if an additional integrity check is configured, it will fail to drop specific malformed IPv6 packets, and then these packets will be forwarded to other connected networks. This issue affects Juniper Networks Junos OS: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-754", description: "CWE-754 Improper Check for Unusual or Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70604", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R3-S9, 20.2R3-S7, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70604", defect: [ "1662400", ], discovery: "USER", }, title: "Junos OS: In a 6PE scenario upon receipt of a specific IPv6 packet an integrity check fails", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28979", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.950Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28982
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an attribute of an active BGP route is updated memory will leak. As rpd memory usage increases over time the rpd process will eventually run out of memory, crash, and restart. The memory utilization can be monitored with the following CLI commands: show task memory show system processes extensive | match rpd This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: 20.3 < 20.3R3-S2 Version: 20.4 < 20.4R3-S6 Version: 21.1 < 21.1R3 Version: 21.2 < 21.2R3 Version: 21.3 < 21.3R2 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.912Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70608", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "20.3R3-S2", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R2", status: "affected", version: "21.3", versionType: "custom", }, ], }, { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "20.3-EVO*", status: "affected", version: "20.3R1-EVO", versionType: "custom", }, { lessThan: "20.4R3-S6-EVO", status: "affected", version: "20.4-EVO", versionType: "custom", }, { lessThan: "21.2R3-EVO", status: "affected", version: "21.2-EVO", versionType: "custom", }, { lessThan: "21.3R2-EVO", status: "affected", version: "21.3-EVO", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "To be exposed to this issue the system needs to be configured with rib sharding as follows:\n\n [system processes routing bgp rib-sharding]", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an attribute of an active BGP route is updated memory will leak. As rpd memory usage increases over time the rpd process will eventually run out of memory, crash, and restart. The memory utilization can be monitored with the following CLI commands: show task memory show system processes extensive | match rpd This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-401", description: "CWE-401 Missing Release of Memory after Effective Lifetime", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70608", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: \nJunos OS Evolved: 20.4R3-S6-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases.\nJunos OS: 20.3R3-S2, 20.4R3-S6, 21.1R3, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases.", }, ], source: { advisory: "JSA70608", defect: [ "1617618", ], discovery: "USER", }, title: "Junos OS and Junos OS Evolved: In a BGP rib sharding scenario when a route is frequently updated an rpd memory leak will occur", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28982", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.912Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28984
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS). The PFE may crash when a lot of MAC learning and aging happens, but due to a Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) that is outside the attackers direct control. This issue affects: Juniper Networks Junos OS versions prior to 19.4R3-S10 on QFX Series; 20.2 versions prior to 20.2R3-S7 on QFX Series; 20.3 versions prior to 20.3R3-S6 on QFX Series; 20.4 versions prior to 20.4R3-S5 on QFX Series; 21.1 versions prior to 21.1R3-S4 on QFX Series; 21.2 versions prior to 21.2R3-S3 on QFX Series; 21.3 versions prior to 21.3R3-S3 on QFX Series; 21.4 versions prior to 21.4R3 on QFX Series; 22.1 versions prior to 22.1R3 on QFX Series; 22.2 versions prior to 22.2R2 on QFX Series.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.4R3-S10 Version: 20.2 < 20.2R3-S7 Version: 20.3 < 20.3R3-S6 Version: 20.4 < 20.4R3-S5 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3-S3 Version: 21.3 < 21.3R3-S3 Version: 21.4 < 21.4R3 Version: 22.1 < 22.1R3 Version: 22.2 < 22.2R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:39.002Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70610", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "QFX Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.4R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "20.2R3-S7", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.3R3-S6", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S5", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S3", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3-S3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R3", status: "affected", version: "22.1", versionType: "custom", }, { lessThan: "22.2R2", status: "affected", version: "22.2", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS). The PFE may crash when a lot of MAC learning and aging happens, but due to a Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) that is outside the attackers direct control. This issue affects: Juniper Networks Junos OS versions prior to 19.4R3-S10 on QFX Series; 20.2 versions prior to 20.2R3-S7 on QFX Series; 20.3 versions prior to 20.3R3-S6 on QFX Series; 20.4 versions prior to 20.4R3-S5 on QFX Series; 21.1 versions prior to 21.1R3-S4 on QFX Series; 21.2 versions prior to 21.2R3-S3 on QFX Series; 21.3 versions prior to 21.3R3-S3 on QFX Series; 21.4 versions prior to 21.4R3 on QFX Series; 22.1 versions prior to 22.1R3 on QFX Series; 22.2 versions prior to 22.2R2 on QFX Series.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-362", description: "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70610", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S10, 20.2R3-S7, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.4R3, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases.\n", }, ], source: { advisory: "JSA70610", defect: [ "1666224", ], discovery: "USER", }, title: "Junos OS: QFX Series: The PFE may crash when a lot of MAC addresses are being learned and aged", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28984", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:39.002Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28981
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: 20.3 < 20.3R3-S5 Version: 20.4 < 20.4R3-S3, 20.4R3-S6 Version: 21.1 < 21.1R3-S4 Version: 21.2 < 21.2R3 Version: 21.3 < 21.3R3 Version: 21.4 < 21.4R2 Version: 22.1 < 22.1R2 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:39.003Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70607", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "20.3R3-S5", status: "affected", version: "20.3", versionType: "custom", }, { lessThan: "20.4R3-S3, 20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S4", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R2", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2", status: "affected", version: "22.1", versionType: "custom", }, ], }, { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "20.3-EVO*", status: "affected", version: "20.3R1-EVO", versionType: "custom", }, { lessThan: "20.4R3-S6-EVO", status: "affected", version: "20.4-EVO", versionType: "custom", }, { lessThan: "21.3R3-EVO", status: "affected", version: "21.3-EVO", versionType: "custom", }, { lessThan: "21.4R2-EVO", status: "affected", version: "21.4-EVO", versionType: "custom", }, { lessThan: "22.1R2-EVO", status: "affected", version: "22.1-EVO", versionType: "custom", }, ], }, ], configurations: [ { lang: "en", value: "To be affected by this vulnerability router advertisements need to be enabled on the interface:\n\n [protocols router-advertisement interface <interface-name>]", }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70607", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue:\nJunos OS Evolved: 20.4R3-S6-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases.\nJunos OS: 20.3R3-S5, 20.4R3-S3, 21.1R3-S4, 21.2R3, 21.3R3, 21.4R2, 22.1R2, 22.2R1, and all subsequent releases.", }, ], source: { advisory: "JSA70607", defect: [ "1645928", ], discovery: "USER", }, title: "Junos OS and Junos OS Evolved: If malformed IPv6 router advertisements are received, memory corruption will occur which causes an rpd crash", workarounds: [ { lang: "en", value: "If the receipt of router advertisements is not necessary (but just the solicited or unsolicited sending of RAs) then incoming RAs can be filtered and dropped by applying a firewall filter like the following:\n\nset firewall family inet6 filter test term 1 from next-header icmp6\nset firewall family inet6 filter test term 1 from icmp-type 134\nset firewall family inet6 filter test term 1 then discard\nset firewall family inet6 filter test term 2 then accept", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28981", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:39.003Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28976
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If specific traffic is received on MX Series and its rate exceeds the respective DDoS protection limit the ingress PFE will crash and restart. Continued receipt of this traffic will create a sustained DoS condition. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S5; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS |
Version: unspecified < 19.1R3-S10 Version: 19.2 < 19.2R3-S7 Version: 19.3 < 19.3R3-S8 Version: 19.4 < 19.4R3-S11 Version: 20.2 < 20.2R3-S5 Version: 20.4 < 20.4R3-S6 Version: 21.1 < 21.1R3-S5 Version: 21.2 < 21.2R3-S4 Version: 21.3 < 21.3R3 Version: 21.4 < 21.4R3 Version: 22.1 < 22.1R2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:39.121Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70601", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "MX Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "19.1R3-S10", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "19.2R3-S7", status: "affected", version: "19.2", versionType: "custom", }, { lessThan: "19.3R3-S8", status: "affected", version: "19.3", versionType: "custom", }, { lessThan: "19.4R3-S11", status: "affected", version: "19.4", versionType: "custom", }, { lessThan: "20.2R3-S5", status: "affected", version: "20.2", versionType: "custom", }, { lessThan: "20.4R3-S6", status: "affected", version: "20.4", versionType: "custom", }, { lessThan: "21.1R3-S5", status: "affected", version: "21.1", versionType: "custom", }, { lessThan: "21.2R3-S4", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R3", status: "affected", version: "21.3", versionType: "custom", }, { lessThan: "21.4R3", status: "affected", version: "21.4", versionType: "custom", }, { lessThan: "22.1R2", status: "affected", version: "22.1", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If specific traffic is received on MX Series and its rate exceeds the respective DDoS protection limit the ingress PFE will crash and restart. Continued receipt of this traffic will create a sustained DoS condition. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S5; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-754", description: "CWE-754 Improper Check for Unusual or Exceptional Conditions", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70601", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S11, 20.2R3-S5, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.", }, ], source: { advisory: "JSA70601", defect: [ "1647532", ], discovery: "USER", }, title: "Junos OS: MX Series: If a specific traffic rate goes above the DDoS threshold it will lead to an FPC crash", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28976", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:39.121Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28978
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confidential information about locally configured (administrative) users of the affected system. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S7-EVO on pending commit???; 21.1-EVO versions prior to 21.1R3-S4-EVO on awaiting build; 21.4-EVO versions prior to 21.4R3-S1-EVO; 22.2-EVO versions prior to 22.2R3-EVO; 21.2-EVO versions prior to 21.2R3-S5-EVO on pending commit???; 21.3-EVO version 21.3R1-EVO and later versions; 22.1-EVO version 22.1R1-EVO and later versions; 22.2-EVO versions prior to 22.2R2-S1-EVO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS Evolved |
Version: 21.3R1-EVO < 21.3-EVO* Version: 21.4-EVO < 21.4R3-S1-EVO Version: 22.1R1-EVO < 22.1-EVO* Version: 22.2-EVO < 22.2R2-S1-EVO |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.902Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70603", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "21.3-EVO*", status: "affected", version: "21.3R1-EVO", versionType: "custom", }, { lessThan: "21.4R3-S1-EVO", status: "affected", version: "21.4-EVO", versionType: "custom", }, { lessThan: "22.1-EVO*", status: "affected", version: "22.1R1-EVO", versionType: "custom", }, { lessThan: "22.2R2-S1-EVO", status: "affected", version: "22.2-EVO", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confidential information about locally configured (administrative) users of the affected system. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S7-EVO on pending commit???; 21.1-EVO versions prior to 21.1R3-S4-EVO on awaiting build; 21.4-EVO versions prior to 21.4R3-S1-EVO; 22.2-EVO versions prior to 22.2R3-EVO; 21.2-EVO versions prior to 21.2R3-S5-EVO on pending commit???; 21.3-EVO version 21.3R1-EVO and later versions; 22.1-EVO version 22.1R1-EVO and later versions; 22.2-EVO versions prior to 22.2R2-S1-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1188", description: "CWE-1188 Insecure Default Initialization of Resource", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70603", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S7-EVO, 21.1R3-S4-EVO, 21.2R3-S5-EVO, 21.4R3-S1-EVO, 22.2R2-EVO, 22.3R1-EVO, and all subsequent releases.\n", }, ], source: { advisory: "JSA70603", defect: [ "1687838", ], discovery: "USER", }, title: "Junos OS Evolved: Read access to some confidential user information is possible", workarounds: [ { lang: "en", value: "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28978", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.902Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-28966
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Juniper Networks | Junos OS Evolved |
Version: unspecified < 20.4R3-S5-EVO Version: 21.2 < 21.2R3-EVO Version: 21.3 < 21.3R2-EVO |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T13:51:38.941Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://supportportal.juniper.net/JSA70590", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Junos OS Evolved", vendor: "Juniper Networks", versions: [ { lessThan: "20.4R3-S5-EVO", status: "affected", version: "unspecified", versionType: "custom", }, { lessThan: "21.2R3-EVO", status: "affected", version: "21.2", versionType: "custom", }, { lessThan: "21.3R2-EVO", status: "affected", version: "21.3", versionType: "custom", }, ], }, ], datePublic: "2023-04-12T00:00:00", descriptions: [ { lang: "en", value: "An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.", }, ], exploits: [ { lang: "en", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-276", description: "CWE-276 Incorrect Default Permissions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T00:00:00", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { url: "https://supportportal.juniper.net/JSA70590", }, ], solutions: [ { lang: "en", value: "The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S5-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases.\n", }, ], source: { advisory: "JSA70590", defect: [ "1621521", ], discovery: "INTERNAL", }, title: "Junos OS Evolved: Local low-privileged user with shell access can execute CLI commands as root", workarounds: [ { lang: "en", value: "Limit access to the system shell from trusted administrators only.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2023-28966", datePublished: "2023-04-17T00:00:00", dateReserved: "2023-03-29T00:00:00", dateUpdated: "2024-08-02T13:51:38.941Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.