CVE-2023-22399Classic Buffer Overflow in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.5%
top 35.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13

Description

When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition. The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe proc

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_osunspecified19.4R3-S9+9
NVDjuniper/junos10 versions+9

🔴Vulnerability Details

2
GHSA
GHSA-93mf-8jhx-j3mg: When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS2023-01-13
CVEList
Junos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled2023-01-12

📋Vendor Advisories

1
Juniper
CVE-2023-22399: When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS2023-01-13
CVE-2023-22399 — Classic Buffer Overflow | cvebase