{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-44186","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-09-26T19:30:27.953Z","datePublished":"2023-10-11T20:08:26.308Z","dateUpdated":"2024-12-03T14:49:41.755Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["MX Series","PTX Series","ACX Series","EX Series","QFX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S8","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*","status":"affected","version":"21.1R1","versionType":"semver"},{"lessThan":"21.2R3-S6","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S5","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S5","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3-S4","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R3-S2","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R2-S2, 22.3R3-S1","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R2-S1, 22.4R3","status":"affected","version":"22.4","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["PTX Series","ACX Series","QFX Series"],"product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S8-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*-EVO","status":"affected","version":"21.1","versionType":"semver"},{"lessThan":"21.2R3-S6-EVO","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S5-EVO","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S5-EVO","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3-S4-EVO","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R3-S2-EVO","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R2-S2-EVO, 22.3R3-S1-EVO","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R2-S1-EVO, 22.4R3-EVO","status":"affected","version":"22.4","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Nonstop Active Routing is enabled using the following configuration:</p> <tt>[edit chassis redundancy]<br></tt><tt>graceful-switchover;<br></tt><tt><br>[edit routing-options]<br></tt><tt>nonstop-routing;</tt>"}],"value":"Nonstop Active Routing is enabled using the following configuration:\n\n [edit chassis redundancy]\ngraceful-switchover;\n\n[edit routing-options]\nnonstop-routing;"}],"datePublic":"2023-10-11T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.</p><p>This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.</p>Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability.<br><p>This issue affects:</p><p>Juniper Networks Junos OS:</p><p></p><ul><li>All versions prior to 20.4R3-S8;</li><li>21.1 versions 21.1R1 and later;</li><li>21.2 versions prior to 21.2R3-S6;</li><li>21.3 versions prior to 21.3R3-S5;</li><li>21.4 versions prior to 21.4R3-S5;</li><li>22.1 versions prior to 22.1R3-S4;</li><li>22.2 versions prior to 22.2R3-S2;</li><li>22.3 versions prior to 22.3R2-S2, 22.3R3-S1;</li><li>22.4 versions prior to 22.4R2-S1, 22.4R3.</li></ul><p></p><p>Juniper Networks Junos OS Evolved</p><p></p><ul><li>All versions prior to 20.4R3-S8-EVO;</li><li>21.1 versions 21.1R1-EVO and later;</li><li>21.2 versions prior to 21.2R3-S6-EVO;</li><li>21.3 versions prior to 21.3R3-S5-EVO;</li><li>21.4 versions prior to 21.4R3-S5-EVO;</li><li>22.1 versions prior to 22.1R3-S4-EVO;</li><li>22.2 versions prior to 22.2R3-S2-EVO;</li><li>22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;</li><li>22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO.</li></ul><p></p>\n\n"}],"value":"\nAn Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.\n\nThis issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.\n\nNote: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability.\nThis issue affects:\n\nJuniper Networks Junos OS:\n\n\n\n  *  All versions prior to 20.4R3-S8;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S6;\n  *  21.3 versions prior to 21.3R3-S5;\n  *  21.4 versions prior to 21.4R3-S5;\n  *  22.1 versions prior to 22.1R3-S4;\n  *  22.2 versions prior to 22.2R3-S2;\n  *  22.3 versions prior to 22.3R2-S2, 22.3R3-S1;\n  *  22.4 versions prior to 22.4R2-S1, 22.4R3.\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n\n  *  All versions prior to 20.4R3-S8-EVO;\n  *  21.1 versions 21.1R1-EVO and later;\n  *  21.2 versions prior to 21.2R3-S6-EVO;\n  *  21.3 versions prior to 21.3R3-S5-EVO;\n  *  21.4 versions prior to 21.4R3-S5-EVO;\n  *  22.1 versions prior to 22.1R3-S4-EVO;\n  *  22.2 versions prior to 22.2R3-S2-EVO;\n  *  22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;\n  *  22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO.\n\n\n\n\n\n\n"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-755","description":"CWE-755 Improper Handling of Exceptional Conditions","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2024-03-05T23:07:57.356Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA73150"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue: </p><p>Junos OS: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1, 22.4R2-S1, 22.4R3, 23.2R1, and all subsequent releases.</p><p>Junos OS Evolved: 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.4R2-S1-EVO, 22.4R3-EVO, 23.2R1-EVO, and all subsequent releases.</p>"}],"value":"The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1, 22.4R2-S1, 22.4R3, 23.2R1, and all subsequent releases.\n\nJunos OS Evolved: 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.4R2-S1-EVO, 22.4R3-EVO, 23.2R1-EVO, and all subsequent releases.\n\n"}],"source":{"advisory":"JSA73150","defect":["1736029"],"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2023-10-11T16:00:00.000Z","value":"Initial Publication"},{"lang":"en","time":"2023-10-16T16:00:00.000Z","value":"Added specific platforms affected and unaffected"},{"lang":"en","time":"2024-03-05T17:00:00.000Z","value":"Updated affected/fixed releases to convey that 23.2R1 and all subsequent releases are fixed."}],"title":"Junos OS and Junos OS Evolved: RPD crash when attempting to send a very long AS PATH to a non-4-byte-AS capable BGP neighbor","workarounds":[{"lang":"en","value":"Current operational and security best practices, such as limiting the AS PATH length, should mitigate risk of this issue.\n\nBelow is an example configuration to limit AS PATH to 30 entries:\n\nset groups BASE-POLICY policy-options policy-statement MaxAS-Limit-30 term more-than-30 from protocol bgp\nset groups BASE-POLICY policy-options policy-statement MaxAS-Limit-30 term more-than-30 from as-path 31as\nset groups BASE-POLICY policy-options policy-statement MaxAS-Limit-30 term more-than-30 then reject\nset groups BASE-POLICY policy-options policy-statement MaxAS-Limit-30 then accept\nset groups BASE-POLICY policy-options policy-statement Customer-IN term MaxAS-Limit from policy MaxAS-Limit-30\nset groups BASE-BGP protocols bgp group <*-CUSTOMER> import Customer-IN\nset groups BASE-PREFIX-LISTS policy-options as-path 31as \".{31,}\""}],"x_generator":{"engine":"Vulnogram 0.1.0-av217"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:59:51.607Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA73150"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-06T16:45:50.764805Z","id":"CVE-2023-44186","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-03T14:49:41.755Z"}}]}}