CVE-2023-22391
13.01.2023, 00:15
A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K Series devices allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Specific packets are being incorrectly routed to a queue used for other high-priority traffic such as BGP, PIM, ICMP, ICMPV6 ND and ISAKMP. Due to this misclassification of traffic, receipt of a high rate of these specific packets will cause delays in the processing of other traffic, leading to a Denial of Service (DoS). Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on ACX2K Series: All versions prior to 19.4R3-S9; All 20.2 versions; 20.3 versions prior to 20.3R3-S6 on ACX2K Series; 20.4 versions prior to 20.4R3-S4 on ACX2K Series; All 21.1 versions; 21.2 versions prior to 21.2R3-S3 on ACX2K Series. Note: This issues affects legacy ACX2K Series PPC-based devices. This platform reached Last Supported Version (LSV) as of the Junos OS 21.2 Release.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 𝑥 < 19.4 |
juniper | junos | 19.4 |
juniper | junos | 19.4:r1 |
juniper | junos | 19.4:r1-s1 |
juniper | junos | 19.4:r1-s2 |
juniper | junos | 19.4:r1-s3 |
juniper | junos | 19.4:r1-s4 |
juniper | junos | 19.4:r2 |
juniper | junos | 19.4:r2-s1 |
juniper | junos | 19.4:r2-s2 |
juniper | junos | 19.4:r2-s3 |
juniper | junos | 19.4:r2-s4 |
juniper | junos | 19.4:r2-s5 |
juniper | junos | 19.4:r3-s7 |
juniper | junos | 19.4:r3-s8 |
juniper | junos | 20.2 |
juniper | junos | 20.2:r1 |
juniper | junos | 20.2:r1-s1 |
juniper | junos | 20.2:r1-s2 |
juniper | junos | 20.2:r1-s3 |
juniper | junos | 20.2:r2 |
juniper | junos | 20.2:r2-s1 |
juniper | junos | 20.2:r2-s2 |
juniper | junos | 20.2:r2-s3 |
juniper | junos | 20.2:r3 |
juniper | junos | 20.2:r3-s1 |
juniper | junos | 20.2:r3-s2 |
juniper | junos | 20.2:r3-s3 |
juniper | junos | 20.2:r3-s4 |
juniper | junos | 20.2:r3-s5 |
juniper | junos | 20.2:r3-s6 |
juniper | junos | 20.3 |
juniper | junos | 20.3:r1 |
juniper | junos | 20.3:r1-s1 |
juniper | junos | 20.3:r1-s2 |
juniper | junos | 20.3:r2 |
juniper | junos | 20.3:r2-s1 |
juniper | junos | 20.3:r3 |
juniper | junos | 20.3:r3-s1 |
juniper | junos | 20.3:r3-s2 |
juniper | junos | 20.3:r3-s3 |
juniper | junos | 20.3:r3-s4 |
juniper | junos | 20.3:r3-s5 |
juniper | junos | 20.4 |
juniper | junos | 20.4:r1 |
juniper | junos | 20.4:r1-s1 |
juniper | junos | 20.4:r2 |
juniper | junos | 20.4:r2-s1 |
juniper | junos | 20.4:r2-s2 |
juniper | junos | 20.4:r3 |
juniper | junos | 20.4:r3-s1 |
juniper | junos | 20.4:r3-s2 |
juniper | junos | 20.4:r3-s3 |
juniper | junos | 21.1 |
juniper | junos | 21.1:r1 |
juniper | junos | 21.1:r1-s1 |
juniper | junos | 21.1:r2 |
juniper | junos | 21.1:r2-s1 |
juniper | junos | 21.1:r2-s2 |
juniper | junos | 21.1:r3 |
juniper | junos | 21.1:r3-s1 |
juniper | junos | 21.1:r3-s2 |
juniper | junos | 21.1:r3-s4 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r2-s1 |
juniper | junos | 21.2:r2-s2 |
juniper | junos | 21.2:r3 |
juniper | junos | 21.2:r3-s1 |
juniper | junos | 21.2:r3-s2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration