{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-28965","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","dateUpdated":"2025-02-06T14:38:56.341Z","dateReserved":"2023-03-29T00:00:00.000Z","datePublished":"2023-04-17T00:00:00.000Z"},"containers":{"cna":{"title":"Junos OS: QFX10002: Failure of storm control feature may lead to Denial of Service","datePublic":"2023-04-12T00:00:00.000Z","providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-04-17T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An Improper Check or Handling of Exceptional Conditions within the storm control feature of Juniper Networks Junos OS allows an attacker sending a high rate of traffic to cause a Denial of Service. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Storm control monitors the level of applicable incoming traffic and compares it with the level specified. If the combined level of the applicable traffic exceeds the specified level, the switch drops packets for the controlled traffic types. This issue affects Juniper Networks Junos OS on QFX10002: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2."}],"affected":[{"vendor":"Juniper Networks","product":"Junos OS","versions":[{"version":"unspecified","lessThan":"19.3R3-S7","status":"affected","versionType":"custom"},{"version":"19.4","status":"affected","lessThan":"19.4R3-S11","versionType":"custom"},{"version":"20.2","status":"affected","lessThan":"20.2R3-S6","versionType":"custom"},{"version":"20.4","status":"affected","lessThan":"20.4R3-S5","versionType":"custom"},{"version":"21.1","status":"affected","lessThan":"21.1R3-S4","versionType":"custom"},{"version":"21.2","status":"affected","lessThan":"21.2R3-S3","versionType":"custom"},{"version":"21.3","status":"affected","lessThan":"21.3R3","versionType":"custom"},{"version":"21.4","status":"affected","lessThan":"21.4R2","versionType":"custom"}],"platforms":["QFX10002"]}],"references":[{"url":"https://supportportal.juniper.net/JSA70589"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-703 Improper Check or Handling of Exceptional Conditions","cweId":"CWE-703"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"JSA70589","defect":["1619359"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"The following provides an example of an affected configuration: \n\n  set interfaces xe-0/0/14:0 unit 0 family ethernet-switching interface-mode trunk\n  set interfaces xe-0/0/14:0 unit 0 family ethernet-switching vlan members v100\n  set interfaces xe-0/0/14:0 unit 0 family ethernet-switching storm-control storm\n  set forwarding-options storm-control-profiles default all\n  set forwarding-options storm-control-profiles storm all bandwidth-level 100\n  set forwarding-options storm-control-profiles storm action-shutdown\n  set protocols lldp interface all\n  set vlans v100 vlan-id 100"}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue."}],"exploits":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"solutions":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R3-S11, 20.2R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3, 21.4R2, 22.1R1 and all subsequent releases.\n"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T13:51:39.130Z"},"title":"CVE Program Container","references":[{"url":"https://supportportal.juniper.net/JSA70589","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-06T14:38:52.939934Z","id":"CVE-2023-28965","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-06T14:38:56.341Z"}}]}}