Lucene search

K
vulnrichmentJuniperVULNRICHMENT:CVE-2023-44191
HistoryOct 12, 2023 - 11:03 p.m.

CVE-2023-44191 Junos OS: QFX5000 Series and EX4000 Series: Denial of Service (DoS) on a large scale VLAN due to PFE hogging

2023-10-1223:03:20
CWE-770
juniper
github.com
juniper networks
denial of service
vlans
pfe hogging

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).

On all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured, a specific DHCP packet will cause PFE hogging which will lead to dropping of socket connections.

This issue affects:

Juniper Networks Junos OS on QFX5000 Series and EX4000 Series

  • 21.1 versions prior to 21.1R3-S5;
  • 21.2 versions prior to 21.2R3-S5;
  • 21.3 versions prior to 21.3R3-S5;
  • 21.4 versions prior to 21.4R3-S4;
  • 22.1 versions prior to 22.1R3-S3;
  • 22.2 versions prior to 22.2R3-S1;
  • 22.3 versions prior to 22.3R2-S2, 22.3R3;
  • 22.4 versions prior to 22.4R2.

This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:juniper_networks:junos_os:*:*:*:*:*:*:*:*"
    ],
    "vendor": "juniper_networks",
    "product": "junos_os",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "21.1r1",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "21.1",
        "lessThan": "21.1r3-s5",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "21.2",
        "lessThan": "21.2r3-s5",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "21.3",
        "lessThan": "21.3r3-s5",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "21.4",
        "lessThan": "21.4r3-s4",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "ss.1r3-s3",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.2",
        "lessThan": "22.2r3-s1",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.3",
        "lessThan": "22.3r2-s2",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.4",
        "lessThan": "22.4r2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-44191