6.1
CVE-2023-44190
- EPSS 0.01%
- Veröffentlicht 11.10.2023 22:15:10
- Zuletzt bearbeitet 21.11.2024 08:25:24
- Quelle sirt@juniper.net
- Teams Watchlist Login
- Unerledigt Login
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device. This issue affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016: * All versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions 22.2R1-EVO and later; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version < 21.4
Juniper ≫ Junos Os Evolved Version21.4 Update-
Juniper ≫ Junos Os Evolved Version21.4 Updater1
Juniper ≫ Junos Os Evolved Version21.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version21.4 Updater1-s2
Juniper ≫ Junos Os Evolved Version21.4 Updater2
Juniper ≫ Junos Os Evolved Version21.4 Updater2-s1
Juniper ≫ Junos Os Evolved Version21.4 Updater2-s2
Juniper ≫ Junos Os Evolved Version21.4 Updater3
Juniper ≫ Junos Os Evolved Version21.4 Updater3-s1
Juniper ≫ Junos Os Evolved Version21.4 Updater3-s2
Juniper ≫ Junos Os Evolved Version21.4 Updater3-s3
Juniper ≫ Junos Os Evolved Version21.4 Updater3-s4
Juniper ≫ Junos Os Evolved Version22.1 Updater1
Juniper ≫ Junos Os Evolved Version22.1 Updater1-s1
Juniper ≫ Junos Os Evolved Version22.1 Updater1-s2
Juniper ≫ Junos Os Evolved Version22.1 Updater2
Juniper ≫ Junos Os Evolved Version22.1 Updater2-s1
Juniper ≫ Junos Os Evolved Version22.1 Updater3
Juniper ≫ Junos Os Evolved Version22.1 Updater3-s1
Juniper ≫ Junos Os Evolved Version22.1 Updater3-s2
Juniper ≫ Junos Os Evolved Version22.1 Updater3-s3
Juniper ≫ Junos Os Evolved Version22.2 Updater1
Juniper ≫ Junos Os Evolved Version22.2 Updater1-s1
Juniper ≫ Junos Os Evolved Version22.2 Updater2
Juniper ≫ Junos Os Evolved Version22.2 Updater2-s1
Juniper ≫ Junos Os Evolved Version22.2 Updater2-s2
Juniper ≫ Junos Os Evolved Version22.2 Updater3
Juniper ≫ Junos Os Evolved Version22.2 Updater3-s1
Juniper ≫ Junos Os Evolved Version22.3 Updater1
Juniper ≫ Junos Os Evolved Version22.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version22.3 Updater1-s2
Juniper ≫ Junos Os Evolved Version22.3 Updater2
Juniper ≫ Junos Os Evolved Version22.3 Updater2-s1
Juniper ≫ Junos Os Evolved Version22.4 Updater1
Juniper ≫ Junos Os Evolved Version22.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version22.4 Updater1-s2
Juniper ≫ Junos Os Evolved Version22.4 Updater2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.008 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
|
sirt@juniper.net | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
|
CWE-346 Origin Validation Error
The product does not properly verify that the source of data or communication is valid.