6.5
CVE-2023-28981
- EPSS 0.06%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:20
- Source sirt@juniper.net
- Teams watchlist Login
- Open Login
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO.
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version20.3 Updater1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s2
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s3
Juniper ≫ Junos Os Evolved Version20.3 Updater2
Juniper ≫ Junos Os Evolved Version20.4 Update-
Juniper ≫ Junos Os Evolved Version20.4 Updater1
Juniper ≫ Junos Os Evolved Version20.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.4 Updater1-s2
Juniper ≫ Junos Os Evolved Version20.4 Updater2
Juniper ≫ Junos Os Evolved Version20.4 Updater2-s1
Juniper ≫ Junos Os Evolved Version20.4 Updater2-s2
Juniper ≫ Junos Os Evolved Version20.4 Updater2-s3
Juniper ≫ Junos Os Evolved Version20.4 Updater3
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s1
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s2
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s3
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s4
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s5
Juniper ≫ Junos Os Evolved Version21.3 Update-
Juniper ≫ Junos Os Evolved Version21.3 Updater1
Juniper ≫ Junos Os Evolved Version21.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version21.3 Updater2
Juniper ≫ Junos Os Evolved Version21.3 Updater2-s1
Juniper ≫ Junos Os Evolved Version21.3 Updater2-s2
Juniper ≫ Junos Os Evolved Version21.4 Update-
Juniper ≫ Junos Os Evolved Version21.4 Updater1
Juniper ≫ Junos Os Evolved Version21.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version21.4 Updater1-s2
Juniper ≫ Junos Os Evolved Version22.1 Updater1
Juniper ≫ Junos Os Evolved Version22.1 Updater1-s1
Juniper ≫ Junos Os Evolved Version22.1 Updater1-s2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.188 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
sirt@juniper.net | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.