ID

VAR-202301-0905


CVE

CVE-2023-22399


TITLE

QFX10K  Run on  Juniper Networks Junos OS  Classic buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-001552

DESCRIPTION

When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition. The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe process. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on QFX10K Series: All versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R1-S2, 22.2R2. QFX10K Run on Juniper Networks Junos OS Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2023-22399 // JVNDB: JVNDB-2023-001552 // VULHUB: VHN-449815 // VULMON: CVE-2023-22399

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:19.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:22.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:22.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.1

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos osscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-001552 // NVD: CVE-2023-22399

CVSS

SEVERITY

CVSSV2

CVSSV3

sirt@juniper.net: CVE-2023-22399
value: HIGH

Trust: 1.0

OTHER: JVNDB-2023-001552
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202301-1026
value: HIGH

Trust: 0.6

sirt@juniper.net: CVE-2023-22399
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2023-001552
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-001552 // CNNVD: CNNVD-202301-1026 // NVD: CVE-2023-22399

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.1

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-449815 // JVNDB: JVNDB-2023-001552 // NVD: CVE-2023-22399

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202301-1026

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202301-1026

PATCH

title:sFlow Monitoring Technology Security Bulletinurl:https://www.juniper.net/documentation/us/en/software/junos/network-mgmt/topics/topic-map/sflow-monitoring-technology.html

Trust: 0.8

title:Juniper Networks Junos OS Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=221266

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2023-22399

Trust: 0.1

sources: VULMON: CVE-2023-22399 // JVNDB: JVNDB-2023-001552 // CNNVD: CNNVD-202301-1026

EXTERNAL IDS

db:NVDid:CVE-2023-22399

Trust: 3.4

db:JUNIPERid:JSA70195

Trust: 1.8

db:JVNDBid:JVNDB-2023-001552

Trust: 0.8

db:CNNVDid:CNNVD-202301-1026

Trust: 0.6

db:VULHUBid:VHN-449815

Trust: 0.1

db:VULMONid:CVE-2023-22399

Trust: 0.1

sources: VULHUB: VHN-449815 // VULMON: CVE-2023-22399 // JVNDB: JVNDB-2023-001552 // CNNVD: CNNVD-202301-1026 // NVD: CVE-2023-22399

REFERENCES

url:https://kb.juniper.net/jsa70195

Trust: 1.8

url:https://www.juniper.net/documentation/us/en/software/junos/network-mgmt/topics/topic-map/sflow-monitoring-technology.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-22399

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-22399/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2023-22399

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-449815 // VULMON: CVE-2023-22399 // JVNDB: JVNDB-2023-001552 // CNNVD: CNNVD-202301-1026 // NVD: CVE-2023-22399

SOURCES

db:VULHUBid:VHN-449815
db:VULMONid:CVE-2023-22399
db:JVNDBid:JVNDB-2023-001552
db:CNNVDid:CNNVD-202301-1026
db:NVDid:CVE-2023-22399

LAST UPDATE DATE

2024-08-14T13:21:15.327000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-449815date:2023-01-24T00:00:00
db:VULMONid:CVE-2023-22399date:2023-01-13T00:00:00
db:JVNDBid:JVNDB-2023-001552date:2023-04-19T09:13:00
db:CNNVDid:CNNVD-202301-1026date:2023-01-28T00:00:00
db:NVDid:CVE-2023-22399date:2023-01-24T19:02:14.717

SOURCES RELEASE DATE

db:VULHUBid:VHN-449815date:2023-01-13T00:00:00
db:VULMONid:CVE-2023-22399date:2023-01-13T00:00:00
db:JVNDBid:JVNDB-2023-001552date:2023-04-19T00:00:00
db:CNNVDid:CNNVD-202301-1026date:2023-01-13T00:00:00
db:NVDid:CVE-2023-22399date:2023-01-13T00:15:10.447