
CVE-2023-44186 – Junos OS and Junos OS Evolved: RPD crash when attempting to send a very long AS PATH to a non-4-byte-AS capable BGP neighbor
https://notcve.org/view.php?id=CVE-2023-44186
11 Oct 2023 — An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition. This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a... • https://supportportal.juniper.net/JSA73150 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2023-4481 – Junos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481)
https://notcve.org/view.php?id=CVE-2023-4481
31 Aug 2023 — An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems. This issue ... • https://kb.juniper.net/JSA72510 • CWE-20: Improper Input Validation •

CVE-2023-36840 – Junos OS and Junos OS Evolved: An rpd crash occurs when a specific L2VPN command is run
https://notcve.org/view.php?id=CVE-2023-36840
14 Jul 2023 — A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. Continued execution of this specific command will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS All versions prior to 19.3R3-S10; 20.1 versions prior t... • https://supportportal.juniper.net/JSA71647 • CWE-617: Reachable Assertion •

CVE-2023-36836 – Junos OS and Junos OS Evolved: In a MoFRR scenario an rpd core may be observed when a low privileged CLI command is executed
https://notcve.org/view.php?id=CVE-2023-36836
14 Jul 2023 — A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can crash when a a specific low privileged CLI command is executed. The rpd crash will impact all routing protocols until the process has automatically been restarted... • https://supportportal.juniper.net/JSA71643 • CWE-908: Use of Uninitialized Resource •

CVE-2023-0026 – 2023-06: Out-of-Cycle Security Bulletin: Junos OS and Junos OS Evolved: A BGP session will flap upon receipt of a specific, optional transitive attribute
https://notcve.org/view.php?id=CVE-2023-0026
21 Jun 2023 — An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, this session will be torn down with an update message error. This issue cannot propagate beyond an affected system as the processing error occurs as soon as... • https://supportportal.juniper.net/JSA71542 • CWE-20: Improper Input Validation •

CVE-2023-28964 – Junos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash
https://notcve.org/view.php?id=CVE-2023-28964
17 Apr 2023 — An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Upon receipt of a malformed BGP flowspec update, RPD will crash resulting in a Denial of Service. This issue affects Juniper Networks Junos ... • https://supportportal.juniper.net/JSA70588 • CWE-130: Improper Handling of Length Parameter Inconsistency •

CVE-2023-28966 – Junos OS Evolved: Local low-privileged user with shell access can execute CLI commands as root
https://notcve.org/view.php?id=CVE-2023-28966
17 Apr 2023 — An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versio... • https://supportportal.juniper.net/JSA70590 • CWE-276: Incorrect Default Permissions •

CVE-2023-28973 – Junos OS Evolved: The 'sysmanctl' shell command allows a local user to gain access to some administrative actions
https://notcve.org/view.php?id=CVE-2023-28973
17 Apr 2023 — An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability. Administrative functions such as daemon restarting, routing engine (RE) switchover, and node shutdown can all be performed through exploitation of the 'sysmanctl' command. Access to the 'sysmanctl' command is only available from the Junos shell. Neither dire... • https://supportportal.juniper.net/JSA70597 • CWE-285: Improper Authorization CWE-287: Improper Authentication •

CVE-2023-28978 – Junos OS Evolved: Read access to some confidential user information is possible
https://notcve.org/view.php?id=CVE-2023-28978
17 Apr 2023 — An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confidential information about locally configured (administrative) users of the affected system. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S7-EVO on pending commit???; 21.1-EVO versions prior to 21.1R3-S4-EVO on awaiting build; 2... • https://supportportal.juniper.net/JSA70603 • CWE-1188: Initialization of a Resource with an Insecure Default •

CVE-2023-28980 – Junos OS and Junos OS Evolved: In a BGP rib sharding scenario an rpd crash will happen shortly after a specific CLI command is issued
https://notcve.org/view.php?id=CVE-2023-28980
17 Apr 2023 — A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (>1M routes). This issue affects: Juniper Networks Junos OS * 20.2 version 20.2R3-S5 and later versions prior to 20.2R3-S6; * 20.3 vers... • https://supportportal.juniper.net/JSA70606 • CWE-416: Use After Free •