fkie_cve-2023-28967
Vulnerability from fkie_nvd
Published
2023-04-17 22:15
Modified
2024-11-21 07:56
Severity ?
Summary
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
References
▼ | URL | Tags | |
---|---|---|---|
sirt@juniper.net | https://supportportal.juniper.net/JSA70591 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://supportportal.juniper.net/JSA70591 | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*", matchCriteriaId: "52C3552E-798F-4719-B38D-F74E34EAAA40", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*", matchCriteriaId: "AE674DD3-3590-4434-B144-5AD7EB5F039D", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*", matchCriteriaId: "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*", matchCriteriaId: "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*", matchCriteriaId: "9D72C3DF-4513-48AC-AAED-C1AADF0794E1", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*", matchCriteriaId: "8C583289-96C4-4451-A320-14CA1C390819", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*", matchCriteriaId: "FA43782E-0719-496E-9237-E1ABD3C4C664", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*", matchCriteriaId: "78897DD2-E161-4191-94FF-7400FB612DF5", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", matchCriteriaId: "620B0CDD-5566-472E-B96A-31D2C12E3120", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", matchCriteriaId: "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", matchCriteriaId: "7E1E57AF-979B-4022-8AD6-B3558E06B718", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", matchCriteriaId: "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", matchCriteriaId: "7BA246F0-154E-4F44-A97B-690D22FA73DD", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", matchCriteriaId: "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", matchCriteriaId: "2B70C784-534B-4FAA-A5ED-3709656E2B97", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", matchCriteriaId: "60448FFB-568E-4280-9261-ADD65244F31A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", matchCriteriaId: "2B770C52-7E3E-4B92-9138-85DEC56F3B22", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", matchCriteriaId: "E88AC378-461C-4EFA-A04B-5786FF21FE03", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", matchCriteriaId: "3B0AFB30-81DC-465C-9F63-D1B15EA4809A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", matchCriteriaId: "2035F0AC-29E7-478A-A9D0-BAA3A88B3413", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", matchCriteriaId: "C34ABD4B-B045-4046-9641-66E3B2082A25", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", matchCriteriaId: "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", matchCriteriaId: "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", matchCriteriaId: "FEE0E145-8E1C-446E-90ED-237E3B9CAF47", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", matchCriteriaId: "0F26369D-21B2-4C6A-98C1-492692A61283", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", matchCriteriaId: "24003819-1A6B-4BDF-B3DF-34751C137788", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", matchCriteriaId: "BF8D332E-9133-45B9-BB07-B33C790F737A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*", matchCriteriaId: "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*", matchCriteriaId: "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*", matchCriteriaId: "C76DA7A5-9320-4E21-96A2-ACE70803A1CA", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*", matchCriteriaId: "703C73EB-2D63-4D4F-8129-239AE1E96B2B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*", matchCriteriaId: "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", matchCriteriaId: "2E907193-075E-45BC-9257-9607DB790D71", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", matchCriteriaId: "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", matchCriteriaId: "CEDF46A8-FC3A-4779-B695-2CA11D045AEB", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", matchCriteriaId: "39809219-9F87-4583-9DAD-9415DD320B36", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", matchCriteriaId: "DB299492-A919-4EBA-A62A-B3CF02FC0A95", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", matchCriteriaId: "74ED0939-D5F8-4334-9838-40F29DE3597F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", matchCriteriaId: "C6937069-8C19-4B01-8415-ED7E9EAE2CE2", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", matchCriteriaId: "750FE748-82E7-4419-A061-2DEA26E35309", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", matchCriteriaId: "236E23E5-8B04-4081-9D97-7300DF284000", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", matchCriteriaId: "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", matchCriteriaId: "97541867-C52F-40BB-9AAE-7E87ED23D789", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", matchCriteriaId: "85CF6664-E35A-4E9B-95C0-CDC91F7F331A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", matchCriteriaId: "D77A072D-350A-42F2-8324-7D3AC1711BF9", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", matchCriteriaId: "83AE395C-A651-4568-88E3-3600544BF799", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*", matchCriteriaId: "5C1C3B09-3800-493E-A319-57648305FE6E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.", }, ], id: "CVE-2023-28967", lastModified: "2024-11-21T07:56:18.400", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "sirt@juniper.net", type: "Primary", }, ], }, published: "2023-04-17T22:15:08.890", references: [ { source: "sirt@juniper.net", tags: [ "Vendor Advisory", ], url: "https://supportportal.juniper.net/JSA70591", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://supportportal.juniper.net/JSA70591", }, ], sourceIdentifier: "sirt@juniper.net", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-908", }, ], source: "sirt@juniper.net", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.