CVE-2023-28980Use After Free in Networks Junos OS

CWE-416Use After Free4 documents4 sources
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 82.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateApr 18

Description

A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (>1M routes). This issue affects: Juniper Networks Junos OS * 20.2 version 20.2R3-S5 and later versions prior to 20.2R3

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved20.4R3-S1-EVO20.4R3-S6-EVO+4
CVEListV5juniper_networks/junos_os20.2R3-S520.2R3-S6+7
NVDjuniper/junos_os_evolved5 versions+4
NVDjuniper/junos8 versions+7

🔴Vulnerability Details

2
GHSA
GHSA-xc2g-3f28-fmc4: A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacke2023-04-18
CVEList
Junos OS and Junos OS Evolved: In a BGP rib sharding scenario an rpd crash will happen shortly after a specific CLI command is issued2023-04-17

📋Vendor Advisories

1
Juniper
CVE-2023-28980: A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacke2023-04-17
CVE-2023-28980 — Use After Free in Networks Junos OS | cvebase