CVE-2023-36836Use of Uninitialized Resource in Networks Junos OS

Severity
4.7MEDIUMNVD
EPSS
0.1%
top 81.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 14

Description

A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can crash when a a specific low privileged CLI command is executed. The rpd crash will impact all routing protocols until the process has automatically b

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.4R3-S6-EVO+6
CVEListV5juniper_networks/junos_os19.4R3-S419.4*+10
NVDjuniper/junos11 versions+10

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: In a MoFRR scenario an rpd core may be observed when a low privileged CLI command is executed2023-07-14
GHSA
GHSA-jmpv-5c86-5fj9: A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local2023-07-14

📋Vendor Advisories

1
Juniper
CVE-2023-36836: A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local2023-07-14
CVE-2023-36836 — Use of Uninitialized Resource | cvebase