Lucene search

K
cveJuniperCVE-2023-44196
HistoryOct 13, 2023 - 12:15 a.m.

CVE-2023-44196

2023-10-1300:15:12
CWE-754
juniper
web.nvd.nist.gov
18
cve-2023-44196
juniper networks
junos os evolved
security vulnerability
packet forwarding
pfe
impact
integrity

CVSS3

6.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

27.3%

An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system.

When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. This issue is a prerequisite for CVE-2023-44195.

This issue affects Juniper Networks Junos OS Evolved:

  • All versions prior to 20.4R3-S8-EVO;
  • 21.1-EVO version 21.1R1-EVO and later;
  • 21.2-EVO versions prior to 21.2R3-S6-EVO;
  • 21.3-EVO version 21.3R1-EVO and later;
  • 21.4-EVO versions prior to 21.4R3-S3-EVO;
  • 22.1-EVO versions prior to 22.1R3-S4-EVO;
  • 22.2-EVO versions prior to 22.2R3-S3-EVO;
  • 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO;
  • 22.4-EVO versions prior to 22.4R2-EVO.

Affected configurations

Nvd
Node
juniperjunos_os_evolvedRange<20.4
OR
juniperjunos_os_evolvedMatch20.4r1
OR
juniperjunos_os_evolvedMatch20.4r1-s1
OR
juniperjunos_os_evolvedMatch20.4r1-s2
OR
juniperjunos_os_evolvedMatch20.4r2
OR
juniperjunos_os_evolvedMatch20.4r2-s1
OR
juniperjunos_os_evolvedMatch20.4r2-s2
OR
juniperjunos_os_evolvedMatch20.4r2-s3
OR
juniperjunos_os_evolvedMatch20.4r3
OR
juniperjunos_os_evolvedMatch20.4r3-s1
OR
juniperjunos_os_evolvedMatch20.4r3-s2
OR
juniperjunos_os_evolvedMatch20.4r3-s3
OR
juniperjunos_os_evolvedMatch20.4r3-s4
OR
juniperjunos_os_evolvedMatch20.4r3-s5
OR
juniperjunos_os_evolvedMatch20.4r3-s6
OR
juniperjunos_os_evolvedMatch20.4r3-s7
OR
juniperjunos_os_evolvedMatch21.1r1
OR
juniperjunos_os_evolvedMatch21.1r1-s1
OR
juniperjunos_os_evolvedMatch21.1r2
OR
juniperjunos_os_evolvedMatch21.1r3
OR
juniperjunos_os_evolvedMatch21.1r3-s1
OR
juniperjunos_os_evolvedMatch21.1r3-s2
OR
juniperjunos_os_evolvedMatch21.1r3-s3
OR
juniperjunos_os_evolvedMatch21.2-
OR
juniperjunos_os_evolvedMatch21.2r1
OR
juniperjunos_os_evolvedMatch21.2r1-s1
OR
juniperjunos_os_evolvedMatch21.2r1-s2
OR
juniperjunos_os_evolvedMatch21.2r2
OR
juniperjunos_os_evolvedMatch21.2r2-s1
OR
juniperjunos_os_evolvedMatch21.2r2-s2
OR
juniperjunos_os_evolvedMatch21.2r3
OR
juniperjunos_os_evolvedMatch21.2r3-s1
OR
juniperjunos_os_evolvedMatch21.2r3-s2
OR
juniperjunos_os_evolvedMatch21.2r3-s3
OR
juniperjunos_os_evolvedMatch21.2r3-s4
OR
juniperjunos_os_evolvedMatch21.2r3-s5
OR
juniperjunos_os_evolvedMatch21.3r1
OR
juniperjunos_os_evolvedMatch21.3r1-s1
OR
juniperjunos_os_evolvedMatch21.3r2
OR
juniperjunos_os_evolvedMatch21.3r2-s1
OR
juniperjunos_os_evolvedMatch21.3r2-s2
OR
juniperjunos_os_evolvedMatch21.3r3
OR
juniperjunos_os_evolvedMatch21.3r3-s1
OR
juniperjunos_os_evolvedMatch21.3r3-s2
OR
juniperjunos_os_evolvedMatch21.3r3-s3
OR
juniperjunos_os_evolvedMatch21.3r3-s4
OR
juniperjunos_os_evolvedMatch21.4-
OR
juniperjunos_os_evolvedMatch21.4r1
OR
juniperjunos_os_evolvedMatch21.4r1-s1
OR
juniperjunos_os_evolvedMatch21.4r1-s2
OR
juniperjunos_os_evolvedMatch21.4r2
OR
juniperjunos_os_evolvedMatch21.4r2-s1
OR
juniperjunos_os_evolvedMatch21.4r2-s2
OR
juniperjunos_os_evolvedMatch21.4r3
OR
juniperjunos_os_evolvedMatch21.4r3-s1
OR
juniperjunos_os_evolvedMatch21.4r3-s2
OR
juniperjunos_os_evolvedMatch21.4r3-s3
OR
juniperjunos_os_evolvedMatch22.1r1
OR
juniperjunos_os_evolvedMatch22.1r1-s1
OR
juniperjunos_os_evolvedMatch22.1r1-s2
OR
juniperjunos_os_evolvedMatch22.1r2
OR
juniperjunos_os_evolvedMatch22.1r2-s1
OR
juniperjunos_os_evolvedMatch22.1r3
OR
juniperjunos_os_evolvedMatch22.1r3-s1
OR
juniperjunos_os_evolvedMatch22.1r3-s2
OR
juniperjunos_os_evolvedMatch22.1r3-s3
OR
juniperjunos_os_evolvedMatch22.2r1
OR
juniperjunos_os_evolvedMatch22.2r1-s1
OR
juniperjunos_os_evolvedMatch22.2r2
OR
juniperjunos_os_evolvedMatch22.2r2-s1
OR
juniperjunos_os_evolvedMatch22.2r2-s2
OR
juniperjunos_os_evolvedMatch22.3r1
OR
juniperjunos_os_evolvedMatch22.3r1-s1
OR
juniperjunos_os_evolvedMatch22.3r1-s2
OR
juniperjunos_os_evolvedMatch22.3r2
OR
juniperjunos_os_evolvedMatch22.3r2-s1
OR
juniperjunos_os_evolvedMatch22.4r1
OR
juniperjunos_os_evolvedMatch22.4r1-s1
OR
juniperjunos_os_evolvedMatch22.4r1-s2
AND
juniperptx10003Match-
VendorProductVersionCPE
juniperjunos_os_evolved*cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*
Rows per page:
1-10 of 801

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "PTX10003 Series"
    ],
    "product": "Junos OS Evolved",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "20.4R3-S8-EVO",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "21.1*-EVO",
        "status": "affected",
        "version": "21.1R1-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "21.2R3-S6-EVO",
        "status": "affected",
        "version": "21.2-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "21.3*-EVO",
        "status": "affected",
        "version": "21.3R1-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4R3-S3-EVO",
        "status": "affected",
        "version": "21.4-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "22.1R3-S4-EVO",
        "status": "affected",
        "version": "22.1-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3-S3-EVO",
        "status": "affected",
        "version": "22.2-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R2-S2-EVO, 22.3R3-EVO",
        "status": "affected",
        "version": "22.3-EVO",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R2-EVO",
        "status": "affected",
        "version": "22.4-EVO",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

27.3%