Lucene search

K
cvelistJuniperCVELIST:CVE-2023-28967
HistoryApr 17, 2023 - 12:00 a.m.

CVE-2023-28967 Junos OS and Junos OS Evolved: An attacker sending genuine BGP packets causes an RPD crash

2023-04-1700:00:00
CWE-908
juniper
www.cve.org
juniper networks
bgp vulnerability
denial of service
genuine bgp packets
unauthenticated attacker

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

39.7%

A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.

CNA Affected

[
  {
    "vendor": "Juniper Networks",
    "product": "Junos OS",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "21.1R1",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "21.1R1",
        "status": "affected",
        "lessThan": "21.1*",
        "versionType": "custom",
        "changes": [
          {
            "at": "21.1R3-S5",
            "status": "unaffected"
          }
        ]
      },
      {
        "version": "21.2R1",
        "status": "affected",
        "lessThan": "21.2*",
        "versionType": "custom",
        "changes": [
          {
            "at": "21.2R3-S2",
            "status": "unaffected"
          }
        ]
      },
      {
        "version": "21.3R1",
        "status": "affected",
        "lessThan": "21.3*",
        "versionType": "custom",
        "changes": [
          {
            "at": "21.3R3-S2",
            "status": "unaffected"
          }
        ]
      },
      {
        "version": "21.4",
        "status": "affected",
        "lessThan": "21.4R3",
        "versionType": "custom"
      },
      {
        "version": "22.1",
        "status": "affected",
        "lessThan": "22.1R3",
        "versionType": "custom"
      },
      {
        "version": "22.2",
        "status": "affected",
        "lessThan": "22.2R2",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Juniper Networks",
    "product": "Junos OS Evolved",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "21.1R1-EVO",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "21.1R1-EVO",
        "status": "affected",
        "lessThan": "21.1-EVO*",
        "versionType": "custom"
      },
      {
        "version": "21.4-EVO",
        "status": "affected",
        "lessThan": "21.4R3-EVO",
        "versionType": "custom"
      },
      {
        "version": "22.1-EVO",
        "status": "affected",
        "lessThan": "22.1R3-EVO",
        "versionType": "custom"
      },
      {
        "version": "22.2-EVO",
        "status": "affected",
        "lessThan": "22.2R2-EVO",
        "versionType": "custom"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

39.7%

Related for CVELIST:CVE-2023-28967