CVE-2023-22401
Junos OS and Junos OS Evolved: PTX10008, PTX10016: When a specific SNMP MIB is queried the FPC will crash
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On the PTX10008 and PTX10016 platforms running Junos OS or Junos OS Evolved, when a specific SNMP MIB is queried this will cause a PFE crash and the FPC will go offline and not automatically recover. A system restart is required to get the affected FPC in an operational state again. This issue affects: Juniper Networks Junos OS 22.1 version 22.1R2 and later versions; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. Juniper Networks Junos OS Evolved 21.3-EVO version 21.3R3-EVO and later versions; 21.4-EVO version 21.4R1-S2-EVO, 21.4R2-EVO and later versions prior to 21.4R2-S1-EVO; 22.1-EVO version 22.1R2-EVO and later versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.
Una vulnerabilidad de validación inadecuada del índice de matriz en el demonio Advanced Forwarding Toolkit Manager (aftmand) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en red provoque una denegación de servicio (DoS). En las plataformas PTX10008 y PTX10016 que ejecutan Junos OS o Junos OS Evolved, cuando se consulta una MIB SNMP específica, se producirá un bloqueo de PFE y el FPC se desconectará y no se recuperará automáticamente. Es necesario reiniciar el sistema para que el FPC afectado vuelva a estar operativo. Este problema afecta a: Juniper Networks Junos OS 22.1 versión 22.1R2 y versiones posteriores; Versiones 22.1 anteriores a 22.1R3; Versiones 22.2 anteriores a 22.2R2. Juniper Networks Junos OS Evolved 21.3-EVO versión 21.3R3-EVO y versiones posteriores; 21.4-EVO versión 21.4R1-S2-EVO, 21.4R2-EVO y versiones posteriores anteriores a 21.4R2-S1-EVO; 22.1-EVO versión 22.1R2-EVO y versiones posteriores anteriores a 22.1R3-EVO; Versiones 22.2-EVO anteriores a 22.2R1-S1-EVO, 22.2R2-EVO.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-12-27 CVE Reserved
- 2023-01-12 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-129: Improper Validation of Array Index
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 22.1 Search vendor "Juniper" for product "Junos" and version "22.1" | r2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 22.1 Search vendor "Juniper" for product "Junos" and version "22.1" | r2-s2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 22.2 Search vendor "Juniper" for product "Junos" and version "22.2" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 22.2 Search vendor "Juniper" for product "Junos" and version "22.2" | r1-s1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 22.2 Search vendor "Juniper" for product "Junos" and version "22.2" | r1-s2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 21.3 Search vendor "Juniper" for product "Junos Os Evolved" and version "21.3" | r3 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 21.4 Search vendor "Juniper" for product "Junos Os Evolved" and version "21.4" | r1-s2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 21.4 Search vendor "Juniper" for product "Junos Os Evolved" and version "21.4" | r2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 22.1 Search vendor "Juniper" for product "Junos Os Evolved" and version "22.1" | r2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 22.2 Search vendor "Juniper" for product "Junos Os Evolved" and version "22.2" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 22.2 Search vendor "Juniper" for product "Junos Os Evolved" and version "22.2" | r2 |
Affected
|