cvelist/2023/22xxx/CVE-2023-22403.json

153 lines
6.1 KiB
JSON
Raw Normal View History

2022-12-27 17:00:43 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2023-01-11T17:00:00.000Z",
2022-12-27 17:00:43 +00:00
"ID": "CVE-2023-22403",
"STATE": "PUBLIC",
"TITLE": "Junos OS: QFX10k Series: An ICCP flap will be observed due to excessive specific traffic"
2022-12-27 17:00:43 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "20.2R3-S7"
},
{
"version_affected": "<",
"version_name": "20.4",
"version_value": "20.4R3-S4"
},
{
"version_affected": "<",
"version_name": "21.1",
"version_value": "21.1R3-S3"
},
{
"version_affected": "<",
"version_name": "21.2",
"version_value": "21.2R3-S1"
},
{
"version_affected": "<",
"version_name": "21.3",
"version_value": "21.3R3"
},
{
"version_affected": "<",
"version_name": "21.4",
"version_value": "21.4R3"
},
{
"version_affected": "<",
"version_name": "22.1",
"version_value": "22.1R2"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"configuration": [
{
"lang": "eng",
"value": "To be exposed to this issue a minimal ICCP configuration like the following needs to be present:\n\n [protocols iccp peer <peer-IP> ...] "
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-12-27 17:00:43 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-01-13 00:00:40 +00:00
"value": "An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On QFX10k Series Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device. This issue affects Juniper Networks Junos OS: All versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-770 Allocation of Resources Without Limits or Throttling"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (DoS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA70199",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA70199"
2022-12-27 17:00:43 +00:00
}
]
},
"solution": [
{
"lang": "eng",
"value": "The following software releases have been updated to resolve this specific issue: 20.2R3-S7, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases."
}
],
"source": {
"advisory": "JSA70199",
"defect": [
"1640483"
],
"discovery": "USER"
},
"work_around": [
{
"lang": "eng",
"value": "There are no known workarounds for this issue."
}
]
2022-12-27 17:00:43 +00:00
}