CVE-2023-28979

An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check. In a 6PE scenario and if an additional integrity check is configured, it will fail to drop specific malformed IPv6 packets, and then these packets will be forwarded to other connected networks. This issue affects Juniper Networks Junos OS: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.7 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
juniperCNA
4.7 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
VendorProductVersion
juniperjunos
𝑥
< 19.3
juniperjunos
19.3
juniperjunos
19.3:r1
juniperjunos
19.3:r1-s1
juniperjunos
19.3:r2
juniperjunos
19.3:r2-s1
juniperjunos
19.3:r2-s2
juniperjunos
19.3:r2-s3
juniperjunos
19.3:r2-s4
juniperjunos
19.3:r2-s5
juniperjunos
19.3:r2-s6
juniperjunos
19.3:r2-s7
juniperjunos
19.3:r3
juniperjunos
19.3:r3-s1
juniperjunos
19.3:r3-s2
juniperjunos
19.3:r3-s3
juniperjunos
19.3:r3-s4
juniperjunos
19.3:r3-s5
juniperjunos
19.3:r3-s6
juniperjunos
19.4
juniperjunos
19.4:r1
juniperjunos
19.4:r1-s1
juniperjunos
19.4:r1-s2
juniperjunos
19.4:r1-s3
juniperjunos
19.4:r1-s4
juniperjunos
19.4:r2
juniperjunos
19.4:r2-s1
juniperjunos
19.4:r2-s2
juniperjunos
19.4:r2-s3
juniperjunos
19.4:r2-s4
juniperjunos
19.4:r2-s5
juniperjunos
19.4:r2-s6
juniperjunos
19.4:r2-s7
juniperjunos
19.4:r3
juniperjunos
19.4:r3-s1
juniperjunos
19.4:r3-s10
juniperjunos
19.4:r3-s2
juniperjunos
19.4:r3-s3
juniperjunos
19.4:r3-s4
juniperjunos
19.4:r3-s5
juniperjunos
19.4:r3-s6
juniperjunos
19.4:r3-s7
juniperjunos
19.4:r3-s8
juniperjunos
20.2
juniperjunos
20.2:r1
juniperjunos
20.2:r1-s1
juniperjunos
20.2:r1-s2
juniperjunos
20.2:r1-s3
juniperjunos
20.2:r2
juniperjunos
20.2:r2-s1
juniperjunos
20.2:r2-s2
juniperjunos
20.2:r2-s3
juniperjunos
20.2:r3
juniperjunos
20.2:r3-s1
juniperjunos
20.2:r3-s2
juniperjunos
20.2:r3-s3
juniperjunos
20.2:r3-s4
juniperjunos
20.2:r3-s5
juniperjunos
20.2:r3-s6
juniperjunos
20.3
juniperjunos
20.3:r1
juniperjunos
20.3:r1-s1
juniperjunos
20.3:r1-s2
juniperjunos
20.3:r2
juniperjunos
20.3:r2-s1
juniperjunos
20.3:r3
juniperjunos
20.3:r3-s1
juniperjunos
20.3:r3-s2
juniperjunos
20.3:r3-s3
juniperjunos
20.3:r3-s4
juniperjunos
20.4
juniperjunos
20.4:r1
juniperjunos
20.4:r1-s1
juniperjunos
20.4:r2
juniperjunos
20.4:r2-s1
juniperjunos
20.4:r2-s2
juniperjunos
20.4:r3
juniperjunos
20.4:r3-s1
juniperjunos
20.4:r3-s2
juniperjunos
20.4:r3-s3
juniperjunos
21.1
juniperjunos
21.1:r1
juniperjunos
21.1:r1-s1
juniperjunos
21.1:r2
juniperjunos
21.1:r2-s1
juniperjunos
21.1:r2-s2
juniperjunos
21.1:r3
juniperjunos
21.1:r3-s1
juniperjunos
21.1:r3-s2
juniperjunos
21.2
juniperjunos
21.2:r1
juniperjunos
21.2:r1-s1
juniperjunos
21.2:r1-s2
juniperjunos
21.2:r2
juniperjunos
21.2:r2-s1
juniperjunos
21.2:r2-s2
juniperjunos
21.2:r3
juniperjunos
21.2:r3-s1
juniperjunos
21.3
juniperjunos
21.3:r1
juniperjunos
21.3:r1-s1
juniperjunos
21.3:r1-s2
juniperjunos
21.3:r2
juniperjunos
21.3:r2-s1
juniperjunos
21.3:r2-s2
juniperjunos
21.3:r3
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r3
juniperjunos
22.1:r1
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
𝑥
= Vulnerable software versions