CVE-2023-36832Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.2%
top 52.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 14

Description

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series allows an unauthenticated network-based attacker to send specific packets to an Aggregated Multiservices (AMS) interface on the device, causing the packet forwarding engine (PFE) to crash, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue is only triggered by packets

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_osunspecified19.1R3-S10+13
NVDjuniper/junos< 19.1+14

🔴Vulnerability Details

2
GHSA
GHSA-6q8j-vvjq-vhjc: An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series allows an unauthenticated2023-07-14
CVEList
Junos OS: MX Series: PFE crash upon receipt of specific packet destined to an AMS interface2023-07-14

📋Vendor Advisories

1
Juniper
CVE-2023-36832: An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series allows an unauthenticated2023-07-14
CVE-2023-36832 — Networks Junos OS vulnerability | cvebase