{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-22414","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","dateUpdated":"2025-04-07T19:54:43.296Z","dateReserved":"2022-12-27T00:00:00.000Z","datePublished":"2023-01-12T00:00:00.000Z"},"containers":{"cna":{"title":"Junos OS: PTX Series and QFX10000 Series: An FPC memory leak is observed when specific EVPN VXLAN Multicast packets are processed","datePublic":"2023-01-11T00:00:00.000Z","providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-01-12T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A Missing Release of Memory after Effective Lifetime vulnerability in Flexible PIC Concentrator (FPC) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker from the same shared physical or logical network, to cause a heap memory leak and leading to FPC crash. On all Junos PTX Series and QFX10000 Series, when specific EVPN VXLAN Multicast packets are processed, an FPC heap memory leak is observed. The FPC memory usage can be monitored using the CLI command \"show heap extensive\". Following is an example output. ID Base Total(b) Free(b) Used(b) % Name Peak used % -- -------- --------- --------- --------- --- ----------- ----------- 0 37dcf000 3221225472 1694526368 1526699104 47 Kernel 47 1 17dcf000 1048576 1048576 0 0 TOE DMA 0 2 17ecf000 1048576 1048576 0 0 DMA 0 3 17fcf000 534773760 280968336 253805424 47 Packet DMA 47 This issue affects: Juniper Networks Junos OS PTX Series and QFX10000 Series 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.1R1 on PTX Series and QFX10000 Series."}],"affected":[{"vendor":"Juniper Networks","product":"Junos OS","versions":[{"version":"unspecified","lessThan":"20.1R1","status":"unaffected","versionType":"custom"},{"version":"20.2","status":"affected","lessThan":"20.2R3-S6","versionType":"custom"},{"version":"20.3","status":"affected","lessThan":"20.3R3-S6","versionType":"custom"},{"version":"20.4","status":"affected","lessThan":"20.4R3-S4","versionType":"custom"},{"version":"21.2","status":"affected","lessThan":"21.2R3-S1","versionType":"custom"},{"version":"21.3","status":"affected","lessThan":"21.3R3","versionType":"custom"},{"version":"21.4","status":"affected","lessThan":"21.4R3","versionType":"custom"},{"version":"22.1","status":"affected","lessThan":"22.1R2","versionType":"custom"},{"version":"22.2","status":"affected","lessThan":"22.2R2","versionType":"custom"}],"platforms":["PTX Series and QFX10000 Series"]}],"references":[{"url":"https://kb.juniper.net/JSA70210"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-401 Missing Release of Memory after Effective Lifetime","cweId":"CWE-401"}]},{"descriptions":[{"type":"text","lang":"en","description":"Denial of Service (DoS)"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"JSA70210","defect":["1661286"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue can occur when multicast and EVPN are configured: \n\n  [protocols evpn]"}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue."}],"exploits":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"solutions":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue: 20.2R3-S6, 20.3R3-S6, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases.\n"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:07:06.570Z"},"title":"CVE Program Container","references":[{"url":"https://kb.juniper.net/JSA70210","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-07T19:54:35.845790Z","id":"CVE-2023-22414","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-07T19:54:43.296Z"}}]}}