Lucene search

K
cvelistJuniperCVELIST:CVE-2023-4481
HistoryAug 31, 2023 - 11:46 p.m.

CVE-2023-4481 2023-08-29 Out-of-Cycle Security Bulletin: Junos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481)

2023-08-3123:46:18
CWE-20
juniper
www.cve.org
out-of-cycle security
improper input validation
bgp update
denial of service
remote attacker
ipv4
ipv6
bgp session

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.4%

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).

When certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems. This issue is exploitable remotely as the crafted UPDATE message can propagate through unaffected systems and intermediate BGP speakers.
Continuous receipt of the crafted BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices.

This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "BGP",
      "rpd"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks, Inc.",
    "versions": [
      {
        "lessThan": "23.4R1",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "modules": [
      "BGP",
      "rpd"
    ],
    "product": "Junos OS Evolved",
    "vendor": "Juniper Networks, Inc.",
    "versions": [
      {
        "lessThan": "23.4R1-EVO",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.4%

Related for CVELIST:CVE-2023-4481