FKIE_CVE-2023-36833

Vulnerability from fkie_nvd - Published: 2023-07-14 17:15 - Updated: 2024-11-21 08:10
Summary
A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). The process 'aftman-bt' will crash after multiple flaps on a multicast-only fast reroute (MoFRR) enabled interface. This will cause the respective FPC to stop forwarding traffic and it needs to be rebooted to restore the service. An indication that the system experienced this issue is the following log message:   <date> <hostname> evo-aftmand-bt[<pid>]: [Error] jexpr_fdb: sanity check failed, ... , app_name L3 Mcast Routes This issue affects Juniper Networks Junos OS Evolved on PTX10001-36MR, PTX10004, PTX10008, PTX10016 with LC1201/1202: 21.2 version 21.2R1-EVO and later versions; 21.3 version 21.3R1-EVO and later versions; 21.4 versions prior to 21.4R3-S3-EVO; 22.1 version 22.1R1-EVO and later versions; 22.2 versions prior to 22.2R3-S2-EVO; 22.3 versions prior to 22.3R3-EVO; 22.4 versions prior to 22.4R1-S2-EVO, 22.4R2-EVO.
Impacted products
Vendor Product Version
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.3
juniper junos_os_evolved 22.3
juniper junos_os_evolved 22.3
juniper junos_os_evolved 22.3
juniper junos_os_evolved 22.3
juniper junos_os_evolved 22.4
juniper junos_os_evolved 22.4
juniper ptx10001-36mr -
juniper ptx10004 -
juniper ptx10008 -
juniper ptx10016 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
              "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
              "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
              "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
              "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
              "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
              "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
              "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
              "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
              "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
              "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
              "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
              "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
              "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
              "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
              "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
              "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
              "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
              "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
              "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
              "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
              "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C188428C-0558-44FB-845C-E885DE9A0733",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C432E543-37F5-4CA0-B239-2B97C6A16907",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65A64A26-4606-4D33-8958-5A3B7FFC4CDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1879799F-18B2-4958-AA90-FD19348C889F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).\n\nThe process \u0027aftman-bt\u0027 will crash after multiple flaps on a multicast-only fast reroute (MoFRR) enabled interface. This will cause the respective FPC to stop forwarding traffic and it needs to be rebooted to restore the service.\n\nAn indication that the system experienced this issue is the following log message:\n\n\u00a0 \u003cdate\u003e \u003chostname\u003e evo-aftmand-bt[\u003cpid\u003e]: [Error] jexpr_fdb: sanity check failed, ... , app_name L3 Mcast Routes\n\n\n\n\nThis issue affects Juniper Networks Junos OS Evolved on PTX10001-36MR, PTX10004, PTX10008, PTX10016 with LC1201/1202:\n21.2 version 21.2R1-EVO and later versions;\n21.3 version 21.3R1-EVO and later versions;\n21.4 versions prior to 21.4R3-S3-EVO;\n22.1 version 22.1R1-EVO and later versions;\n22.2 versions prior to 22.2R3-S2-EVO;\n22.3 versions prior to 22.3R3-EVO;\n22.4 versions prior to 22.4R1-S2-EVO, 22.4R2-EVO.\n\n\n\n"
    }
  ],
  "id": "CVE-2023-36833",
  "lastModified": "2024-11-21T08:10:42.170",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "sirt@juniper.net",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-14T17:15:09.133",
  "references": [
    {
      "source": "sirt@juniper.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://supportportal.juniper.net/JSA71640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://supportportal.juniper.net/JSA71640"
    }
  ],
  "sourceIdentifier": "sirt@juniper.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "sirt@juniper.net",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…