CVE-2023-22395
13.01.2023, 00:15
A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). In an MPLS scenario specific packets destined to an Integrated Routing and Bridging (irb) interface of the device will cause a buffer (mbuf) to leak. Continued receipt of these specific packets will eventually cause a loss of connectivity to and from the device, and requires a reboot to recover. These mbufs can be monitored by using the CLI command 'show system buffers': user@host> show system buffers 783/1497/2280 mbufs in use (current/cache/total) user@host> show system buffers 793/1487/2280 mbufs in use (current/cache/total) <<<<<< mbuf usage increased This issue affects Juniper Networks Junos OS: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 𝑥 < 19.3 |
juniper | junos | 19.3 |
juniper | junos | 19.3:r1 |
juniper | junos | 19.3:r1-s1 |
juniper | junos | 19.3:r2 |
juniper | junos | 19.3:r2-s1 |
juniper | junos | 19.3:r2-s2 |
juniper | junos | 19.3:r2-s3 |
juniper | junos | 19.3:r2-s4 |
juniper | junos | 19.3:r2-s5 |
juniper | junos | 19.3:r2-s6 |
juniper | junos | 19.3:r3 |
juniper | junos | 19.3:r3-s1 |
juniper | junos | 19.3:r3-s2 |
juniper | junos | 19.3:r3-s3 |
juniper | junos | 19.3:r3-s4 |
juniper | junos | 19.3:r3-s5 |
juniper | junos | 19.3:r3-s6 |
juniper | junos | 19.4 |
juniper | junos | 19.4:r1 |
juniper | junos | 19.4:r1-s1 |
juniper | junos | 19.4:r1-s2 |
juniper | junos | 19.4:r1-s3 |
juniper | junos | 19.4:r1-s4 |
juniper | junos | 19.4:r2 |
juniper | junos | 19.4:r2-s1 |
juniper | junos | 19.4:r2-s2 |
juniper | junos | 19.4:r2-s3 |
juniper | junos | 19.4:r2-s4 |
juniper | junos | 19.4:r2-s5 |
juniper | junos | 19.4:r2-s6 |
juniper | junos | 19.4:r2-s7 |
juniper | junos | 19.4:r3 |
juniper | junos | 19.4:r3-s1 |
juniper | junos | 19.4:r3-s2 |
juniper | junos | 19.4:r3-s3 |
juniper | junos | 19.4:r3-s4 |
juniper | junos | 19.4:r3-s5 |
juniper | junos | 19.4:r3-s6 |
juniper | junos | 19.4:r3-s7 |
juniper | junos | 19.4:r3-s8 |
juniper | junos | 19.4:r3-s9 |
juniper | junos | 20.1:r1 |
juniper | junos | 20.1:r1-s1 |
juniper | junos | 20.1:r1-s2 |
juniper | junos | 20.1:r1-s3 |
juniper | junos | 20.1:r1-s4 |
juniper | junos | 20.1:r2 |
juniper | junos | 20.1:r2-s1 |
juniper | junos | 20.1:r2-s2 |
juniper | junos | 20.1:r3 |
juniper | junos | 20.1:r3-s1 |
juniper | junos | 20.1:r3-s2 |
juniper | junos | 20.1:r3-s3 |
juniper | junos | 20.1:r3-s4 |
juniper | junos | 20.2 |
juniper | junos | 20.2:r1 |
juniper | junos | 20.2:r1-s1 |
juniper | junos | 20.2:r1-s2 |
juniper | junos | 20.2:r1-s3 |
juniper | junos | 20.2:r2 |
juniper | junos | 20.2:r2-s1 |
juniper | junos | 20.2:r2-s2 |
juniper | junos | 20.2:r2-s3 |
juniper | junos | 20.2:r3 |
juniper | junos | 20.2:r3-s1 |
juniper | junos | 20.2:r3-s2 |
juniper | junos | 20.2:r3-s3 |
juniper | junos | 20.2:r3-s4 |
juniper | junos | 20.3 |
juniper | junos | 20.3:r1 |
juniper | junos | 20.3:r1-s1 |
juniper | junos | 20.3:r1-s2 |
juniper | junos | 20.3:r2 |
juniper | junos | 20.3:r2-s1 |
juniper | junos | 20.3:r3 |
juniper | junos | 20.3:r3-s1 |
juniper | junos | 20.3:r3-s2 |
juniper | junos | 20.3:r3-s3 |
juniper | junos | 20.3:r3-s4 |
juniper | junos | 20.4 |
juniper | junos | 20.4:r1 |
juniper | junos | 20.4:r1-s1 |
juniper | junos | 20.4:r2 |
juniper | junos | 20.4:r2-s1 |
juniper | junos | 20.4:r2-s2 |
juniper | junos | 20.4:r3 |
juniper | junos | 20.4:r3-s1 |
juniper | junos | 20.4:r3-s2 |
juniper | junos | 20.4:r3-s3 |
juniper | junos | 21.1 |
juniper | junos | 21.1:r1 |
juniper | junos | 21.1:r1-s1 |
juniper | junos | 21.1:r2 |
juniper | junos | 21.1:r2-s1 |
juniper | junos | 21.1:r2-s2 |
juniper | junos | 21.1:r3 |
juniper | junos | 21.1:r3-s1 |
juniper | junos | 21.1:r3-s2 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r2-s1 |
juniper | junos | 21.2:r2-s2 |
juniper | junos | 21.2:r3 |
juniper | junos | 21.2:r3-s1 |
juniper | junos | 21.3 |
juniper | junos | 21.3:r1 |
juniper | junos | 21.3:r1-s1 |
juniper | junos | 21.3:r1-s2 |
juniper | junos | 21.3:r2 |
juniper | junos | 21.3:r2-s1 |
juniper | junos | 21.3:r2-s2 |
juniper | junos | 21.3:r3 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
juniper | junos | 21.4:r2 |
juniper | junos | 21.4:r2-s1 |
juniper | junos | 22.1:r1 |
juniper | junos | 22.1:r1-s1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration