Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2023-44181

Disclosure Date: October 13, 2023
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog.

This issue is triggered when Storm control is enabled and ICMPv6 packets are present on device.

This issue affects Juniper Networks:

Junos OS

  • All versions prior to 20.2R3-S6 on QFX5k;
  • 20.3 versions prior to 20.3R3-S5 on QFX5k;
  • 20.4 versions prior to 20.4R3-S5 on QFX5k;
  • 21.1 versions prior to 21.1R3-S4 on QFX5k;
  • 21.2 versions prior to 21.2R3-S3 on QFX5k;
  • 21.3 versions prior to 21.3R3-S2 on QFX5k;
  • 21.4 versions prior to 21.4R3 on QFX5k;
  • 22.1 versions prior to 22.1R3 on QFX5k;
  • 22.2 versions prior to 22.2R2 on QFX5k.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • juniper

Products

  • junos,
  • junos 20.2,
  • junos 20.3,
  • junos 20.4,
  • junos 21.1,
  • junos 21.2,
  • junos 21.3,
  • junos 21.4,
  • junos 22.1,
  • junos 22.2

Additional Info

Technical Analysis