CVE-2023-36840
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/07/2023
Última modificación:
27/07/2023
Descripción
*** Pendiente de traducción *** A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS).<br />
<br />
On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. Continued execution of this specific command will create a sustained Denial of Service (DoS) condition.<br />
<br />
This issue affects:<br />
Juniper Networks Junos OS<br />
All versions prior to 19.3R3-S10;<br />
20.1 versions prior to 20.1R3-S4;<br />
20.2 versions prior to 20.2R3-S6;<br />
20.3 versions prior to 20.3R3-S6;<br />
20.4 versions prior to 20.4R3-S5;<br />
21.1 versions prior to 21.1R3-S4;<br />
21.2 versions prior to 21.2R3-S3;<br />
21.3 versions prior to 21.3R3-S2;<br />
21.4 versions prior to 21.4R3;<br />
22.1 versions prior to 22.1R3;<br />
22.2 versions prior to 22.2R2;<br />
22.3 versions prior to 22.3R2;<br />
<br />
Juniper Networks Junos OS Evolved<br />
All versions prior to 20.4R3-S7-EVO;<br />
21.1 versions prior to 21.1R3-S3-EVO;<br />
21.2 versions prior to 21.2R3-S5-EVO;<br />
21.3 versions prior to 21.3R3-S4-EVO;<br />
21.4 versions prior to 21.4R3-EVO;<br />
22.1 versions prior to 22.1R3-EVO;<br />
22.2 versions prior to 22.2R2-EVO;<br />
22.3 versions prior to 22.3R2-EVO;<br />
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* | 19.3 (excluyendo) | |
| cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



