Lucene search

K
nvd[email protected]NVD:CVE-2023-22401
HistoryJan 13, 2023 - 12:15 a.m.

CVE-2023-22401

2023-01-1300:15:10
CWE-129
web.nvd.nist.gov
3
juniper networks
dos
network-based attacker
ptx10008
ptx10016
snmp
mib
pfe crash
fpc
restart
junos os 22.1
22.2
junos os evolved 21.3
21.4
22.1
22.2
cve-2023-22401

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.2%

An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On the PTX10008 and PTX10016 platforms running Junos OS or Junos OS Evolved, when a specific SNMP MIB is queried this will cause a PFE crash and the FPC will go offline and not automatically recover. A system restart is required to get the affected FPC in an operational state again. This issue affects: Juniper Networks Junos OS 22.1 version 22.1R2 and later versions; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. Juniper Networks Junos OS Evolved 21.3-EVO version 21.3R3-EVO and later versions; 21.4-EVO version 21.4R1-S2-EVO, 21.4R2-EVO and later versions prior to 21.4R2-S1-EVO; 22.1-EVO version 22.1R2-EVO and later versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.

Affected configurations

Nvd
Node
juniperjunosMatch22.1r2
OR
juniperjunosMatch22.1r2-s2
OR
juniperjunosMatch22.2r1
OR
juniperjunosMatch22.2r1-s1
OR
juniperjunosMatch22.2r1-s2
OR
juniperjunos_os_evolvedMatch21.3r3
OR
juniperjunos_os_evolvedMatch21.4r1-s2
OR
juniperjunos_os_evolvedMatch21.4r2
OR
juniperjunos_os_evolvedMatch22.1r2
OR
juniperjunos_os_evolvedMatch22.2r1
OR
juniperjunos_os_evolvedMatch22.2r2
VendorProductVersionCPE
juniperjunos22.1cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*
juniperjunos22.1cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*
juniperjunos_os_evolved21.3cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*
juniperjunos_os_evolved21.4cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*
juniperjunos_os_evolved21.4cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*
juniperjunos_os_evolved22.1cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*
juniperjunos_os_evolved22.2cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*
Rows per page:
1-10 of 111

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.2%

Related for NVD:CVE-2023-22401