CVE-2023-44181
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/10/2023
Last modified:
20/10/2023
Description
<br />
An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog.<br />
<br />
This issue is triggered when Storm control is enabled and ICMPv6 packets are present on device.<br />
<br />
This issue affects Juniper Networks:<br />
<br />
Junos OS<br />
<br />
<br />
<br />
* All versions prior to 20.2R3-S6 on QFX5k;<br />
* 20.3 versions prior to 20.3R3-S5 on QFX5k;<br />
* 20.4 versions prior to 20.4R3-S5 on QFX5k;<br />
* 21.1 versions prior to 21.1R3-S4 on QFX5k;<br />
* 21.2 versions prior to 21.2R3-S3 on QFX5k;<br />
* 21.3 versions prior to 21.3R3-S2 on QFX5k;<br />
* 21.4 versions prior to 21.4R3 on QFX5k;<br />
* 22.1 versions prior to 22.1R3 on QFX5k;<br />
* 22.2 versions prior to 22.2R2 on QFX5k.<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* | 20.2 (excluding) | |
| cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



