{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-44181","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-09-26T19:30:17.664Z","datePublished":"2023-10-12T23:01:38.150Z","dateUpdated":"2024-09-18T14:43:54.724Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["QFX5k"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.2R3-S6","status":"affected","version":"0","versionType":"semver"},{"lessThan":"20.3R3-S5","status":"affected","version":"20.3","versionType":"semver"},{"lessThan":"20.4R3-S5","status":"affected","version":"20.4","versionType":"semver"},{"lessThan":"21.1R3-S4","status":"affected","version":"21.1","versionType":"semver"},{"lessThan":"21.2R3-S3","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S2","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R2","status":"affected","version":"22.2","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>This issue might be seen if the following conditions are met on Junos OS QFX5k platforms:</p><p>Enabling storm-control</p><p>For example : </p><tt>[forwarding-options set storm-control-profiles profile-name all bandwidth-level kbps]<br></tt><tt>[edit set interfaces interface-name unit 0 family ethernet-switching storm-control profile-name ]</tt>"}],"value":"This issue might be seen if the following conditions are met on Junos OS QFX5k platforms:\n\nEnabling storm-control\n\nFor example : \n\n[forwarding-options set storm-control-profiles profile-name all bandwidth-level kbps]\n[edit set interfaces interface-name unit 0 family ethernet-switching storm-control profile-name ]"}],"datePublic":"2023-10-11T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog.</p><p>This issue is triggered when Storm control is enabled and ICMPv6 packets are present on device.</p><p>This issue affects Juniper Networks:</p><p>Junos OS</p><p></p><ul><li>All versions prior to 20.2R3-S6 on QFX5k;</li><li>20.3 versions prior to 20.3R3-S5 on QFX5k;</li><li>20.4 versions prior to 20.4R3-S5 on QFX5k;</li><li>21.1 versions prior to 21.1R3-S4 on QFX5k;</li><li>21.2 versions prior to 21.2R3-S3 on QFX5k;</li><li>21.3 versions prior to 21.3R3-S2 on QFX5k;</li><li>21.4 versions prior to 21.4R3 on QFX5k;</li><li>22.1 versions prior to 22.1R3 on QFX5k;</li><li>22.2 versions prior to 22.2R2 on QFX5k.</li></ul><p></p>\n\n"}],"value":"\nAn Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog.\n\nThis issue is triggered when Storm control is enabled and ICMPv6 packets are present on device.\n\nThis issue affects Juniper Networks:\n\nJunos OS\n\n\n\n  *  All versions prior to 20.2R3-S6 on QFX5k;\n  *  20.3 versions prior to 20.3R3-S5 on QFX5k;\n  *  20.4 versions prior to 20.4R3-S5 on QFX5k;\n  *  21.1 versions prior to 21.1R3-S4 on QFX5k;\n  *  21.2 versions prior to 21.2R3-S3 on QFX5k;\n  *  21.3 versions prior to 21.3R3-S2 on QFX5k;\n  *  21.4 versions prior to 21.4R3 on QFX5k;\n  *  22.1 versions prior to 22.1R3 on QFX5k;\n  *  22.2 versions prior to 22.2R2 on QFX5k.\n\n\n\n\n\n\n"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"358: Improperly Implemented Security Check for Standard vulnerability","lang":"en"}]},{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-10-12T23:01:38.150Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA73145"},{"tags":["product"],"url":"https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/task/rate-limiting-storm-control-disabling-cli-els.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue:&nbsp;<span style=\"background-color: var(--darkreader-bg--wht);\">Junos OS 20.2R3-S6, 20.3R3-S5, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S2, 21.4R3, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases.</span></p>"}],"value":"The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S6, 20.3R3-S5, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S2, 21.4R3, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases.\n\n"}],"source":{"advisory":"JSA73145","defect":["1670242"],"discovery":"USER"},"timeline":[{"lang":"en","time":"2023-10-11T16:00:00.000Z","value":"Initial Publication"}],"title":"Junos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Disable storm control configuration.</p>"}],"value":"Disable storm control configuration.\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-av217"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:59:51.354Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA73145"},{"tags":["product","x_transferred"],"url":"https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/task/rate-limiting-storm-control-disabling-cli-els.html"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T14:43:39.606562Z","id":"CVE-2023-44181","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T14:43:54.724Z"}}]}}