CVE-2023-28976Improper Check for Unusual or Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.2%
top 51.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateApr 18

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If specific traffic is received on MX Series and its rate exceeds the respective DDoS protection limit the ingress PFE will crash and restart. Continued receipt of this traffic will create a sustained DoS condition. This issue affects Juniper Networks Junos OS on

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_osunspecified19.1R3-S10+10
NVDjuniper/junos< 19.1+11

🔴Vulnerability Details

2
GHSA
GHSA-9v2r-2hf5-3vjw: An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series2023-04-18
CVEList
Junos OS: MX Series: If a specific traffic rate goes above the DDoS threshold it will lead to an FPC crash2023-04-17

📋Vendor Advisories

1
Juniper
CVE-2023-28976: An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series2023-04-17
CVE-2023-28976 — Networks Junos OS vulnerability | cvebase