GHSA-F7RX-678F-VF6Q

Vulnerability from github – Published: 2023-10-13 00:30 – Updated: 2024-04-04 08:37
VLAI?
Details

An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system.

If specific packets reach the Routing-Engine (RE) these will be processed normally even if firewall filters are in place which should have prevented this. This can lead to a limited, increased consumption of resources resulting in a Denial-of-Service (DoS), and unauthorized access.

CVE-2023-44196 is a prerequisite for this issue.

This issue affects Juniper Networks Junos OS Evolved:

  • 21.3-EVO versions prior to 21.3R3-S5-EVO;
  • 21.4-EVO versions prior to 21.4R3-S4-EVO;
  • 22.1-EVO version 22.1R1-EVO and later;
  • 22.2-EVO version 22.2R1-EVO and later;
  • 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
  • 22.4-EVO versions prior to 22.4R3-EVO.

This issue doesn't not affected Junos OS Evolved versions prior to 21.3R1-EVO.

Show details on source website

{
  "affected": [],
  "aliases": [
    "CVE-2023-44195"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-923"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2023-10-13T00:15:12Z",
    "severity": "MODERATE"
  },
  "details": "\nAn Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system.\n\nIf specific packets reach the Routing-Engine (RE) these will be processed normally even if firewall filters are in place which should have prevented this. This can lead to a limited, increased consumption of resources resulting in a Denial-of-Service (DoS), and unauthorized access.\n\nCVE-2023-44196 is a prerequisite for this issue.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n\n\n\n  *  21.3-EVO versions prior to 21.3R3-S5-EVO;\n  *  21.4-EVO versions prior to 21.4R3-S4-EVO;\n  *  22.1-EVO version 22.1R1-EVO and later;\n  *  22.2-EVO version 22.2R1-EVO and later;\n  *  22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;\n  *  22.4-EVO versions prior to 22.4R3-EVO.\n\n\n\n\nThis issue doesn\u0027t not affected Junos OS Evolved versions prior to 21.3R1-EVO.\n\n\n\n",
  "id": "GHSA-f7rx-678f-vf6q",
  "modified": "2024-04-04T08:37:16Z",
  "published": "2023-10-13T00:30:19Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44195"
    },
    {
      "type": "WEB",
      "url": "https://supportportal.juniper.net/JSA73160"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…