CVE-2023-44191
13.10.2023, 00:15
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured, a specific DHCP packet will cause PFE hogging which will lead to dropping of socket connections. This issue affects: Juniper Networks Junos OS on QFX5000 Series and EX4000 Series * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1Enginsight
Vendor | Product | Version |
---|---|---|
juniper_networks | junos_os | 𝑥 < 21.1r1 |
juniper_networks | junos_os | 21.1r3-s5 < 𝑥 < 21.1r3-s5 |
juniper_networks | junos_os | 21.2r3-s5 < 𝑥 < 21.2r3-s5 |
juniper_networks | junos_os | 21.3r3-s5 < 𝑥 < 21.3r3-s5 |
juniper_networks | junos_os | 21.4r3-s4 < 𝑥 < 21.4r3-s4 |
juniper_networks | junos_os | ss.1r3-s3 < 𝑥 < ss.1r3-s3 |
juniper_networks | junos_os | 22.2r3-s1 < 𝑥 < 22.2r3-s1 |
juniper_networks | junos_os | 22.3r2-s2 < 𝑥 < 22.3r2-s2 |
juniper_networks | junos_os | 22.4r2 < 𝑥 < 22.4r2 |
juniper | junos | 21.1 |
juniper | junos | 21.1:r1 |
juniper | junos | 21.1:r1-s1 |
juniper | junos | 21.1:r2 |
juniper | junos | 21.1:r2-s1 |
juniper | junos | 21.1:r2-s2 |
juniper | junos | 21.1:r3 |
juniper | junos | 21.1:r3-s1 |
juniper | junos | 21.1:r3-s2 |
juniper | junos | 21.1:r3-s3 |
juniper | junos | 21.1:r3-s4 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r2-s1 |
juniper | junos | 21.2:r2-s2 |
juniper | junos | 21.2:r3 |
juniper | junos | 21.2:r3-s1 |
juniper | junos | 21.2:r3-s2 |
juniper | junos | 21.2:r3-s3 |
juniper | junos | 21.2:r3-s4 |
juniper | junos | 21.3 |
juniper | junos | 21.3:r1 |
juniper | junos | 21.3:r1-s1 |
juniper | junos | 21.3:r1-s2 |
juniper | junos | 21.3:r2 |
juniper | junos | 21.3:r2-s1 |
juniper | junos | 21.3:r2-s2 |
juniper | junos | 21.3:r3 |
juniper | junos | 21.3:r3-s1 |
juniper | junos | 21.3:r3-s2 |
juniper | junos | 21.3:r3-s3 |
juniper | junos | 21.3:r3-s4 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
juniper | junos | 21.4:r2 |
juniper | junos | 21.4:r2-s1 |
juniper | junos | 21.4:r2-s2 |
juniper | junos | 21.4:r3 |
juniper | junos | 21.4:r3-s1 |
juniper | junos | 21.4:r3-s2 |
juniper | junos | 21.4:r3-s3 |
juniper | junos | 22.1:r1 |
juniper | junos | 22.1:r1-s1 |
juniper | junos | 22.1:r1-s2 |
juniper | junos | 22.1:r2 |
juniper | junos | 22.1:r2-s1 |
juniper | junos | 22.1:r2-s2 |
juniper | junos | 22.1:r3 |
juniper | junos | 22.1:r3-s1 |
juniper | junos | 22.1:r3-s2 |
juniper | junos | 22.2 |
juniper | junos | 22.2:r1 |
juniper | junos | 22.2:r1-s1 |
juniper | junos | 22.2:r1-s2 |
juniper | junos | 22.2:r3 |
juniper | junos | 22.3:r1 |
juniper | junos | 22.3:r1-s1 |
juniper | junos | 22.3:r1-s2 |
juniper | junos | 22.3:r2 |
juniper | junos | 22.3:r2-s1 |
juniper | junos | 22.4:r1 |
juniper | junos | 22.4:r1-s1 |
juniper | junos | 22.4:r1-s2 |
𝑥
= Vulnerable software versions