CVE-2023-28964Improper Handling of Length Parameter Inconsistency in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.3%
top 42.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateApr 18

Description

An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Upon receipt of a malformed BGP flowspec update, RPD will crash resulting in a Denial of Service. This issue affects Juniper Net

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.1R3-EVO+2
CVEListV5juniper_networks/junos_osunspecified18.1R3-S11+10
NVDjuniper/junos< 18.1+11

🔴Vulnerability Details

2
GHSA
GHSA-jwqv-5v5p-9h8m: An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Ev2023-04-18
CVEList
Junos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash2023-04-17

📋Vendor Advisories

1
Juniper
CVE-2023-28964: An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Ev2023-04-17
CVE-2023-28964 — Networks Junos OS vulnerability | cvebase