CVE-2023-44185

An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet.

Continued receipt of this packet will cause a sustained Denial of Service condition.

This issue affects:



  *  Juniper Networks Junos OS:
  *  All versions prior to 20.4R3-S6;
  *  21.1 versions prior to 21.1R3-S5;
  *  21.2 versions prior to 21.2R3-S4;
  *  21.3 versions prior to 21.3R3-S3;
  *  21.4 versions prior to 21.4R3-S3;
  *  22.1 versions prior to 22.1R2-S2, 22.1R3;
  *  22.2 versions prior to 22.2R2-S1, 22.2R3;
  *  22.3 versions prior to 22.3R1-S2, 22.3R2.




Juniper Networks Junos OS Evolved:



  *  All versions prior to 20.4R3-S6-EVO;
  *  21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO;
  *  21.3-EVO versions prior to 21.3R3-S3-EVO;
  *  21.4-EVO versions prior to 21.4R3-S3-EVO;
  *  22.1-EVO versions prior to 22.1R3-EVO;
  *  22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO;
  *  22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.






ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
VendorProductVersion
juniperjunos
𝑥
< 20.4
juniperjunos
20.4
juniperjunos
20.4:r1
juniperjunos
20.4:r1-s1
juniperjunos
20.4:r2
juniperjunos
20.4:r2-s1
juniperjunos
20.4:r2-s2
juniperjunos
20.4:r3
juniperjunos
20.4:r3-s1
juniperjunos
20.4:r3-s2
juniperjunos
20.4:r3-s3
juniperjunos
20.4:r3-s4
juniperjunos
20.4:r3-s5
juniperjunos
21.1
juniperjunos
21.1:r1
juniperjunos
21.1:r1-s1
juniperjunos
21.1:r2
juniperjunos
21.1:r2-s1
juniperjunos
21.1:r2-s2
juniperjunos
21.1:r3
juniperjunos
21.1:r3-s1
juniperjunos
21.1:r3-s2
juniperjunos
21.1:r3-s3
juniperjunos
21.1:r3-s4
juniperjunos
21.2
juniperjunos
21.2:r1
juniperjunos
21.2:r1-s1
juniperjunos
21.2:r1-s2
juniperjunos
21.2:r2
juniperjunos
21.2:r2-s1
juniperjunos
21.2:r2-s2
juniperjunos
21.2:r3
juniperjunos
21.2:r3-s1
juniperjunos
21.2:r3-s2
juniperjunos
21.2:r3-s3
juniperjunos
21.3
juniperjunos
21.3:r1
juniperjunos
21.3:r1-s1
juniperjunos
21.3:r1-s2
juniperjunos
21.3:r2
juniperjunos
21.3:r2-s1
juniperjunos
21.3:r2-s2
juniperjunos
21.3:r3
juniperjunos
21.3:r3-s1
juniperjunos
21.3:r3-s2
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r2-s1
juniperjunos
21.4:r2-s2
juniperjunos
21.4:r3
juniperjunos
21.4:r3-s1
juniperjunos
21.4:r3-s2
juniperjunos
22.1:r1
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.1:r2
juniperjunos
22.1:r2-s1
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
juniperjunos
22.2:r2
juniperjunos
22.3:r1
juniperjunos
22.3:r1-s1
juniperjunos_os_evolved
𝑥
< 20.4
juniperjunos_os_evolved
20.4
juniperjunos_os_evolved
20.4:r1
juniperjunos_os_evolved
20.4:r1-s1
juniperjunos_os_evolved
20.4:r1-s2
juniperjunos_os_evolved
20.4:r2
juniperjunos_os_evolved
20.4:r2-s1
juniperjunos_os_evolved
20.4:r2-s2
juniperjunos_os_evolved
20.4:r2-s3
juniperjunos_os_evolved
20.4:r3
juniperjunos_os_evolved
20.4:r3-s1
juniperjunos_os_evolved
20.4:r3-s2
juniperjunos_os_evolved
20.4:r3-s3
juniperjunos_os_evolved
20.4:r3-s4
juniperjunos_os_evolved
20.4:r3-s5
juniperjunos_os_evolved
21.1
juniperjunos_os_evolved
21.1:r1
juniperjunos_os_evolved
21.1:r1-s1
juniperjunos_os_evolved
21.1:r2
juniperjunos_os_evolved
21.1:r3
juniperjunos_os_evolved
21.1:r3-s1
juniperjunos_os_evolved
21.1:r3-s2
juniperjunos_os_evolved
21.1:r3-s3
juniperjunos_os_evolved
21.2
juniperjunos_os_evolved
21.2:r1
juniperjunos_os_evolved
21.2:r1-s1
juniperjunos_os_evolved
21.2:r1-s2
juniperjunos_os_evolved
21.2:r2
juniperjunos_os_evolved
21.2:r2-s1
juniperjunos_os_evolved
21.2:r2-s2
juniperjunos_os_evolved
21.2:r3
juniperjunos_os_evolved
21.2:r3-s1
juniperjunos_os_evolved
21.2:r3-s2
juniperjunos_os_evolved
21.2:r3-s3
juniperjunos_os_evolved
21.3
juniperjunos_os_evolved
21.3:r1
juniperjunos_os_evolved
21.3:r1-s1
juniperjunos_os_evolved
21.3:r2
juniperjunos_os_evolved
21.3:r2-s1
juniperjunos_os_evolved
21.3:r2-s2
juniperjunos_os_evolved
21.3:r3
juniperjunos_os_evolved
21.3:r3-s1
juniperjunos_os_evolved
21.3:r3-s2
juniperjunos_os_evolved
21.4
juniperjunos_os_evolved
21.4:r1
juniperjunos_os_evolved
21.4:r1-s1
juniperjunos_os_evolved
21.4:r1-s2
juniperjunos_os_evolved
21.4:r2
juniperjunos_os_evolved
21.4:r2-s1
juniperjunos_os_evolved
21.4:r2-s2
juniperjunos_os_evolved
21.4:r3
juniperjunos_os_evolved
21.4:r3-s1
juniperjunos_os_evolved
21.4:r3-s2
juniperjunos_os_evolved
22.1:r1
juniperjunos_os_evolved
22.1:r1-s1
juniperjunos_os_evolved
22.1:r1-s2
juniperjunos_os_evolved
22.1:r2
juniperjunos_os_evolved
22.1:r2-s1
juniperjunos_os_evolved
22.2:r1
juniperjunos_os_evolved
22.2:r1-s1
juniperjunos_os_evolved
22.2:r2
juniperjunos_os_evolved
22.3:r1
juniperjunos_os_evolved
22.3:r1-s1
𝑥
= Vulnerable software versions