CVE-2023-44185

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/10/2023
Last modified:
19/10/2023

Description

<br /> An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet.<br /> <br /> Continued receipt of this packet will cause a sustained Denial of Service condition.<br /> <br /> This issue affects:<br /> <br /> <br /> <br /> * Juniper Networks Junos OS:<br /> * All versions prior to 20.4R3-S6;<br /> * 21.1 versions prior to 21.1R3-S5;<br /> * 21.2 versions prior to 21.2R3-S4;<br /> * 21.3 versions prior to 21.3R3-S3;<br /> * 21.4 versions prior to 21.4R3-S3;<br /> * 22.1 versions prior to 22.1R2-S2, 22.1R3;<br /> * 22.2 versions prior to 22.2R2-S1, 22.2R3;<br /> * 22.3 versions prior to 22.3R1-S2, 22.3R2.<br /> <br /> <br /> <br /> <br /> Juniper Networks Junos OS Evolved:<br /> <br /> <br /> <br /> * All versions prior to 20.4R3-S6-EVO;<br /> * 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO;<br /> * 21.3-EVO versions prior to 21.3R3-S3-EVO;<br /> * 21.4-EVO versions prior to 21.4R3-S3-EVO;<br /> * 22.1-EVO versions prior to 22.1R3-EVO;<br /> * 22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO;<br /> * 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.<br /> <br /> <br /> <br /> <br /> <br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* 20.4 (excluding)
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*


References to Advisories, Solutions, and Tools