
CVE-2023-44177 – Junos OS and Junos OS Evolved: Stack overflow vulnerability in CLI command processing
https://notcve.org/view.php?id=CVE-2023-44177
12 Oct 2023 — A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions prior to 19.1R3-S10; * 19.2 versions prior to 19.2R3-S7; * 19.3 versions prior to 19.3R3-S8; * 19.4 versions prior to 19.4R3-S12; * 20.2 versions prior to 20... • https://supportportal.juniper.net/JSA73140 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2023-44175 – Junos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash
https://notcve.org/view.php?id=CVE-2023-44175
12 Oct 2023 — A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Note: This issue is not noticed when all the devices in the network are Juniper devices. This issue affects Juniper Networks: Junos OS: * All versions prior to 20.... • https://supportportal.juniper.net/JSA73141 • CWE-617: Reachable Assertion •

CVE-2023-36843 – Junos OS: SRX Series: The PFE will crash on receiving malformed SSL traffic when Sky ATP is enabled
https://notcve.org/view.php?id=CVE-2023-36843
12 Oct 2023 — An Improper Handling of Inconsistent Special Elements vulnerability in the Junos Services Framework (jsf) module of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause a crash in the Packet Forwarding Engine (pfe) and thereby resulting in a Denial of Service (DoS). Upon receiving malformed SSL traffic, the PFE crashes. A manual restart will be needed to recover the device. This issue only affects devices with Juniper Networks Advanced Threat Prevention (ATP) Cloud enabled wit... • https://supportportal.juniper.net/JSA73174 • CWE-168: Improper Handling of Inconsistent Special Elements •

CVE-2023-36841 – Junos OS: MX Series: Receipt of malformed TCP traffic will cause a Denial of Service
https://notcve.org/view.php?id=CVE-2023-36841
12 Oct 2023 — An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS). An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover. This issue affects interfaces wit... • https://supportportal.juniper.net/JSA73172 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-36839 – Junos OS and Junos OS Evolved: An l2cpd crash will occur when specific LLDP packets are received
https://notcve.org/view.php?id=CVE-2023-36839
12 Oct 2023 — An Improper Validation of Specified Quantity in Input vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker who sends specific LLDP packets to cause a Denial of Service(DoS). This issue occurs when specific LLDP packets are received and telemetry polling is being done on the device. The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP. Also, if any servic... • https://supportportal.juniper.net/JSA73171 • CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2023-22392 – Junos OS: PTX Series and QFX10000 Series: Received flow-routes which aren't installed as the hardware doesn't support them, lead to an FPC heap memory leak
https://notcve.org/view.php?id=CVE-2023-22392
12 Oct 2023 — A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). PTX3000, PTX5000, QFX10000, PTX1000, PTX10002, and PTX10004, PTX10008 and PTX10016 with LC110x FPCs do not support certain flow-routes. Once a flow-route is received over an established BGP session and an attempt is made to install the resulting filter into the PFE, FPC heap memory is leaked. The... • https://supportportal.juniper.net/JSA73530 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2023-44190 – Junos OS Evolved: PTX10001, PTX10004, PTX10008, PTX10016: MAC address validation bypass vulnerability
https://notcve.org/view.php?id=CVE-2023-44190
11 Oct 2023 — An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the... • https://supportportal.juniper.net/JSA73154 • CWE-346: Origin Validation Error •

CVE-2023-44189 – Junos OS Evolved: PTX10003 Series: MAC address validation bypass vulnerability
https://notcve.org/view.php?id=CVE-2023-44189
11 Oct 2023 — An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device. This issue affects Juniper... • https://supportportal.juniper.net/JSA73153 • CWE-346: Origin Validation Error •

CVE-2023-44188 – Junos OS: jkdsd crash due to multiple telemetry requests
https://notcve.org/view.php?id=CVE-2023-44188
11 Oct 2023 — A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debugging Streaming Daemon (jkdsd) process to crash, leading to a Denial of Service (DoS). Continued receipt and processing of telemetry requests will repeatedly crash the jkdsd process and sustain the Denial of Service (DoS) condition. This issue is seen on all Junos... • https://supportportal.juniper.net/JSA73152 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2023-44187 – Junos OS Evolved: 'file copy' CLI command can disclose password to shell users
https://notcve.org/view.php?id=CVE-2023-44187
11 Oct 2023 — An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system. This issue affects Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S7-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S5-EVO; * 21.3 versions prior to 21.3R3-S4-EVO; * 21.4... • https://supportportal.juniper.net/JSA73151 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •