{ "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2023-04-12T16:00:00.000Z", "ID": "CVE-2023-28967", "STATE": "PUBLIC", "TITLE": "Junos OS and Junos OS Evolved: An attacker sending genuine BGP packets causes an RPD crash" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": ">=", "version_name": "21.1", "version_value": "21.1R1" }, { "version_affected": "<", "version_name": "21.1", "version_value": "21.1R3-S5" }, { "version_affected": ">=", "version_name": "21.2", "version_value": "21.2R1" }, { "version_affected": "<", "version_name": "21.2", "version_value": "21.2R3-S2" }, { "version_affected": ">=", "version_name": "21.3", "version_value": "21.3R1" }, { "version_affected": "<", "version_name": "21.3", "version_value": "21.3R3-S2" }, { "version_affected": "<", "version_name": "21.4", "version_value": "21.4R3" }, { "version_affected": "<", "version_name": "22.1", "version_value": "22.1R3" }, { "version_affected": "<", "version_name": "22.2", "version_value": "22.2R2" }, { "version_affected": "!<", "version_value": "21.1R1" } ] } }, { "product_name": "Junos OS Evolved", "version": { "version_data": [ { "version_affected": ">=", "version_name": "21.1-EVO", "version_value": "21.1R1-EVO" }, { "version_affected": "<", "version_name": "21.4-EVO", "version_value": "21.4R3-EVO" }, { "version_affected": "<", "version_name": "22.1-EVO", "version_value": "22.1R3-EVO" }, { "version_affected": "<", "version_name": "22.2-EVO", "version_value": "22.2R2-EVO" }, { "version_affected": "!<", "version_value": "21.1R1-EVO" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "eng", "value": "The following minimal configuration is required:\n\n [protocols bgp]" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO." } ] }, "exploit": [ { "lang": "eng", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (DoS)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-908: Use of Uninitialized Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportportal.juniper.net/JSA70591", "refsource": "CONFIRM", "url": "https://supportportal.juniper.net/JSA70591" } ] }, "solution": [ { "lang": "eng", "value": "The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 21.1R3-S5, 21.2R3-S2, 21.3R3-S2, 21.4R3, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases.\n\nJunos OS Evolved: 21.4R3-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, and all subsequent releases." } ], "source": { "advisory": "JSA70591", "defect": [ "1673833" ], "discovery": "USER" }, "work_around": [ { "lang": "eng", "value": "There are no known workarounds for this issue. \n\nTo reduce the risk of exploitation utilize common security BCPs to limit the exploitable surface by disallowing access to all BGP services on networks and devices to only trusted systems, administrators, networks and hosts." } ] }