{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-22403", "ASSIGNER": "sirt@juniper.net", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "\nAn Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\n\n\nOn QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device.\n\n\n\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\n\n * All versions prior to 20.2R3-S7;\n * 20.4 versions prior to 20.4R3-S4;\n * 21.1 versions prior to 21.1R3-S3;\n * 21.2 versions prior to 21.2R3-S1;\n * 21.3 versions prior to 21.3R3;\n * 21.4 versions prior to 21.4R3;\n * 22.1 versions prior to 22.1R2.\n\n\n\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770 Allocation of Resources Without Limits or Throttling", "cweId": "CWE-770" } ] }, { "description": [ { "lang": "eng", "value": "Denial of Service (DoS)" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Juniper Networks", "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": "<", "version_name": "unspecified", "version_value": "20.2R3-S7" }, { "version_affected": "<", "version_name": "20.4", "version_value": "20.4R3-S4" }, { "version_affected": "<", "version_name": "21.1", "version_value": "21.1R3-S3" }, { "version_affected": "<", "version_name": "21.2", "version_value": "21.2R3-S1" }, { "version_affected": "<", "version_name": "21.3", "version_value": "21.3R3" }, { "version_affected": "<", "version_name": "21.4", "version_value": "21.4R3" }, { "version_affected": "<", "version_name": "22.1", "version_value": "22.1R2" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://kb.juniper.net/JSA70199", "refsource": "MISC", "name": "https://kb.juniper.net/JSA70199" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "source": { "advisory": "JSA70199", "defect": [ "1640483" ], "discovery": "USER" }, "configuration": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "
To be exposed to this issue a minimal ICCP configuration like the following needs to be present:
[protocols iccp peer <peer-IP> ...]
There are no known workarounds for this issue.
" } ], "value": "There are no known workarounds for this issue.\n\n" } ], "exploit": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
" } ], "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" } ], "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The following software releases have been updated to resolve this specific issue: 20.2R3-S7, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.
" } ], "value": "The following software releases have been updated to resolve this specific issue: 20.2R3-S7, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.\n\n" } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ] } }