CVE-2023-28981Improper Input Validation in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 78.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateApr 18

Description

An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved20.3R1-EVO20.3-EVO*+4
CVEListV5juniper_networks/junos_os20.320.3R3-S5+6
NVDjuniper/junos_os_evolved5 versions+4
NVDjuniper/junos7 versions+6

🔴Vulnerability Details

2
GHSA
GHSA-pjch-863f-79m3: An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacke2023-04-18
CVEList
Junos OS and Junos OS Evolved: If malformed IPv6 router advertisements are received, memory corruption will occur which causes an rpd crash2023-04-17

📋Vendor Advisories

1
Juniper
CVE-2023-28981: An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacke2023-04-17
CVE-2023-28981 — Improper Input Validation | cvebase