Juniper Networks Junos OS and Junos OS Evolved denial of service | CVE-2023-44186

NAME
__________
Juniper Networks Junos OS and Junos OS Evolved denial of service

Platforms Affected:
Juniper Networks Junos OS 21.1
Juniper Networks Junos OS 21.2
Juniper Networks Junos OS Evolved 21.1
Juniper Networks Junos OS Evolved 21.2
Juniper Networks Junos OS Evolved 21.3
Juniper Networks Junos OS 21.3
Juniper Networks Junos OS 21.4
Juniper Networks Junos OS 22.1
Juniper Networks Junos OS 22.2
Juniper Networks Junos OS 22.3
Juniper Networks Junos OS 22.4
Juniper Networks Junos OS Evolved 22.1
Juniper Networks Junos OS Evolved 22.2
Juniper Networks Junos OS Evolved 22.3
Juniper Networks Junos OS Evolved 22.4
Juniper Networks Junos OS 23.2
Juniper Networks Junos OS Evolved 23.2

Risk Level:
7.5

Exploitability:
Unproven

Consequences:
Denial of Service

DESCRIPTION
__________

Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by an improper handling of exceptional conditions flaw in the AS PATH processing. By sending a specially crafted BGP update message with an AS PATH, a remote attacker could exploit this vulnerability to cause RPD to crash.

CVSS 3.0 Information
__________

Privileges Required:
None

User Interaction:
None

Scope:
Unchanged

Access Vector:
Network



A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

 To keep up to date follow us on the below channels.