{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-22403","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","dateUpdated":"2025-04-07T19:55:11.399Z","dateReserved":"2022-12-27T00:00:00.000Z","datePublished":"2023-01-12T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["QFX10K Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.2R3-S7","status":"affected","version":"unspecified","versionType":"custom"},{"lessThan":"20.4R3-S4","status":"affected","version":"20.4","versionType":"custom"},{"lessThan":"21.1R3-S3","status":"affected","version":"21.1","versionType":"custom"},{"lessThan":"21.2R3-S1","status":"affected","version":"21.2","versionType":"custom"},{"lessThan":"21.3R3","status":"affected","version":"21.3","versionType":"custom"},{"lessThan":"21.4R3","status":"affected","version":"21.4","versionType":"custom"},{"lessThan":"22.1R2","status":"affected","version":"22.1","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>To be exposed to this issue a minimal ICCP configuration like the following needs to be present:</p><code>  [protocols iccp peer &lt;peer-IP&gt; ...] </code><br/>"}],"value":"To be exposed to this issue a minimal ICCP configuration like the following needs to be present:\n\n  [protocols iccp peer <peer-IP> ...] \n"}],"datePublic":"2023-01-11T17:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).<br><br></p><p>On QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device.<br><br></p><p>This issue affects Juniper Networks Junos OS on QFX10K Series:</p><ul><li>All versions prior to 20.2R3-S7;</li><li>20.4 versions prior to 20.4R3-S4;</li><li>21.1 versions prior to 21.1R3-S3;</li><li>21.2 versions prior to 21.2R3-S1;</li><li>21.3 versions prior to 21.3R3;</li><li>21.4 versions prior to 21.4R3;</li><li>22.1 versions prior to 22.1R2.</li></ul>\n\n"}],"value":"\nAn Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\n\n\nOn QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device.\n\n\n\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\n\n  *  All versions prior to 20.2R3-S7;\n  *  20.4 versions prior to 20.4R3-S4;\n  *  21.1 versions prior to 21.1R3-S3;\n  *  21.2 versions prior to 21.2R3-S1;\n  *  21.3 versions prior to 21.3R3;\n  *  21.4 versions prior to 21.4R3;\n  *  22.1 versions prior to 22.1R2.\n\n\n\n\n"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-770","description":"CWE-770 Allocation of Resources Without Limits or Throttling","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-08-08T20:39:25.537Z"},"references":[{"tags":["vendor-advisory"],"url":"https://kb.juniper.net/JSA70199"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue: 20.2R3-S7, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.</p>"}],"value":"The following software releases have been updated to resolve this specific issue: 20.2R3-S7, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.\n\n"}],"source":{"advisory":"JSA70199","defect":["1640483"],"discovery":"USER"},"timeline":[{"lang":"en","time":"2023-08-08T21:00:00.000Z","value":"Explicitly state \"QFX10K Series\" in Description and Platforms"}],"title":"Junos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>"}],"value":"There are no known workarounds for this issue.\n\n"}],"x_generator":{"engine":"Vulnogram 0.0.9"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:07:06.545Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://kb.juniper.net/JSA70199"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-07T19:55:03.227843Z","id":"CVE-2023-22403","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-07T19:55:11.399Z"}}]}}