Vulnerability in Juniper Networks Junos OS NAT Librar
Reporter | Title | Published | Views | Family All 4 |
---|---|---|---|---|
![]() | CVE-2023-22409 Junos OS: SRX Series, MX Series with SPC3: When an inconsistent NAT configuration exists and a specific CLI command is issued the SPC will reboot | 12 Jan 202300:00 | – | vulnrichment |
![]() | Race condition | 13 Jan 202300:15 | – | prion |
![]() | CVE-2023-22409 | 13 Jan 202300:15 | – | nvd |
![]() | CVE-2023-22409 Junos OS: SRX Series, MX Series with SPC3: When an inconsistent NAT configuration exists and a specific CLI command is issued the SPC will reboot | 12 Jan 202300:00 | – | cvelist |
[
{
"vendor": "Juniper Networks",
"product": "Junos OS",
"versions": [
{
"version": "unspecified",
"lessThan": "19.4R3-S10",
"status": "affected",
"versionType": "custom"
},
{
"version": "20.1R1",
"status": "affected",
"lessThan": "20.1*",
"versionType": "custom"
},
{
"version": "20.2",
"status": "affected",
"lessThan": "20.2R3-S6",
"versionType": "custom"
},
{
"version": "20.3",
"status": "affected",
"lessThan": "20.3R3-S6",
"versionType": "custom"
},
{
"version": "20.4",
"status": "affected",
"lessThan": "20.4R3-S5",
"versionType": "custom"
},
{
"version": "21.1",
"status": "affected",
"lessThan": "21.1R3-S4",
"versionType": "custom"
},
{
"version": "21.2",
"status": "affected",
"lessThan": "21.2R3-S3",
"versionType": "custom"
},
{
"version": "21.3",
"status": "affected",
"lessThan": "21.3R3-S3",
"versionType": "custom"
},
{
"version": "21.4",
"status": "affected",
"lessThan": "21.4R3-S1",
"versionType": "custom"
},
{
"version": "22.1",
"status": "affected",
"lessThan": "22.1R2-S2, 22.1R3",
"versionType": "custom"
},
{
"version": "22.2",
"status": "affected",
"lessThan": "22.2R2",
"versionType": "custom"
}
],
"platforms": [
"SRX Series, MX Series with SPC3"
]
}
]
Source | Link |
---|---|
kb | www.kb.juniper.net/JSA70205 |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
address | request body | /services/nat/source/pool/TEST-POOL | Unchecked input for loop condition can lead to DoS when specific CLI command is executed. | CWE-1284 |
port deterministic block-size | request body | /services/nat/source/pool/TEST-POOL | Unchecked input for loop condition can lead to DoS when specific CLI command is executed. | CWE-1284 |
port deterministic host address | request body | /services/nat/source/pool/TEST-POOL | Unchecked input for loop condition can lead to DoS when specific CLI command is executed. | CWE-1284 |
port deterministic include-boundary-addresses | request body | /services/nat/source/pool/TEST-POOL | Unchecked input for loop condition can lead to DoS when specific CLI command is executed. | CWE-1284 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo