CVE-2023-36835
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/07/2023
Última modificación:
27/07/2023
Descripción
*** Pendiente de traducción *** An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on QFX10000 Series allows a network based attacker to cause a Denial of Service (DoS).<br />
<br />
If a specific valid IP packet is received and that packet needs to be routed over a VXLAN tunnel, this will result in a PFE wedge condition due to which traffic gets impacted. As this is not a crash and restart scenario, this condition will persist until the system is rebooted to recover.<br />
<br />
This issue affects Juniper Networks Junos OS on QFX10000:<br />
20.3 version 20.3R1 and later versions;<br />
20.4 versions prior to 20.4R3-S5;<br />
21.1 versions prior to 21.1R3-S5;<br />
21.2 versions prior to 21.2R3-S5;<br />
21.3 versions prior to 21.3R3-S4;<br />
21.4 versions prior to 21.4R3-S1;<br />
22.1 versions prior to 22.1R3;<br />
22.2 versions prior to 22.2R2;<br />
22.3 versions prior to 22.3R1-S2, 22.3R2.<br />
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



