mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
234 lines
12 KiB
JSON
234 lines
12 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-36834",
|
|
"ASSIGNER": "sirt@juniper.net",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An Incomplete Internal State Distinction vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series allows an adjacent attacker to cause a Denial of Service (DoS).\n\nIf an SRX is configured in L2 transparent mode the receipt of a specific genuine packet can cause a single Packet Processing Engines (PPE) component of the PFE to run into a loop, which in turn will render the PPE unavailable. Each packet will cause one PPE to get into a loop, leading to a gradual performance degradation until all PPEs are unavailable and all traffic processing stops. To recover the affected FPC need to be restarted.\n\nThis issue affects Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series:\n20.1 version 20.1R1 and later versions;\n20.2 versions prior to 20.2R3-S7;\n20.3 version 20.3R1 and later versions;\n20.4 versions prior to 20.4R3-S7;\n21.1 versions prior to 21.1R3-S5;\n21.2 versions prior to 21.2R3-S3;\n21.3 versions prior to 21.3R3-S3;\n21.4 versions prior to 21.4R3-S1;\n22.1 versions prior to 22.1R3;\n22.2 versions prior to 22.2R2;\n22.3 versions prior to 22.3R1-S1, 22.3R2.\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-372 Incomplete Internal State Distinction",
|
|
"cweId": "CWE-372"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Denial of Service (DoS)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Juniper Networks",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Junos OS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "20.1R1",
|
|
"status": "affected"
|
|
}
|
|
],
|
|
"lessThan": "20.1*",
|
|
"status": "affected",
|
|
"version": "20.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "20.2R3-S7",
|
|
"status": "affected",
|
|
"version": "20.2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "20.3R1",
|
|
"status": "affected"
|
|
}
|
|
],
|
|
"lessThan": "20.3*",
|
|
"status": "affected",
|
|
"version": "20.3",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "20.4R3-S7",
|
|
"status": "affected",
|
|
"version": "20.4",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.1R3-S5",
|
|
"status": "affected",
|
|
"version": "21.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.2R3-S3",
|
|
"status": "affected",
|
|
"version": "21.2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.3R3-S3",
|
|
"status": "affected",
|
|
"version": "21.3",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "21.4R3-S1",
|
|
"status": "affected",
|
|
"version": "21.4",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.1R3",
|
|
"status": "affected",
|
|
"version": "22.1",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.2R2",
|
|
"status": "affected",
|
|
"version": "22.2",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"lessThan": "22.3R1-S1, 22.3R2",
|
|
"status": "affected",
|
|
"version": "22.3",
|
|
"versionType": "custom"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://supportportal.juniper.net/JSA71641",
|
|
"refsource": "MISC",
|
|
"name": "https://supportportal.juniper.net/JSA71641"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"advisory": "JSA71641",
|
|
"defect": [
|
|
"1685927"
|
|
],
|
|
"discovery": "USER"
|
|
},
|
|
"configuration": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "To be exposed to this issue an SRX needs to be configured for L2 transparent mode like in the following example:<br><br><tt> [ interfaces <interface1> unit <unit> family ethernet-switching vlan members <vlan> ]<br> [ interfaces <interface2> unit <unit> family ethernet-switching vlan members <vlan> ]<br> [ vlans <vlan> vlan-id <vlan ID> ]</tt>"
|
|
}
|
|
],
|
|
"value": "To be exposed to this issue an SRX needs to be configured for L2 transparent mode like in the following example:\n\n\u00a0 [ interfaces <interface1> unit <unit> family ethernet-switching vlan members <vlan> ]\n\u00a0 [ interfaces <interface2> unit <unit> family ethernet-switching vlan members <vlan> ]\n\u00a0 [ vlans <vlan> vlan-id <vlan ID> ]"
|
|
}
|
|
],
|
|
"work_around": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "There are no known workarounds for this issue.<br>"
|
|
}
|
|
],
|
|
"value": "There are no known workarounds for this issue.\n"
|
|
}
|
|
],
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>"
|
|
}
|
|
],
|
|
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n"
|
|
}
|
|
],
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S7, 20.4R3-S7, 21.1R3-S5, 21.2R3-S3, 21.3R3-S3, 21.4R3-S1, 22.1R3, 22.2R2, 22.3R1-S1, 22.3R2, 22.4R1, and all subsequent releases.<br>"
|
|
}
|
|
],
|
|
"value": "The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S7, 20.4R3-S7, 21.1R3-S5, 21.2R3-S3, 21.3R3-S3, 21.4R3-S1, 22.1R3, 22.2R2, 22.3R1-S1, 22.3R2, 22.4R1, and all subsequent releases.\n"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |