{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-44196","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-09-26T19:30:32.349Z","datePublished":"2023-10-12T23:05:06.222Z","dateUpdated":"2024-09-18T14:01:01.123Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["PTX10003 Series"],"product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S8-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*-EVO","status":"affected","version":"21.1R1-EVO","versionType":"semver"},{"lessThan":"21.2R3-S6-EVO","status":"affected","version":"21.2-EVO","versionType":"semver"},{"lessThan":"21.3*-EVO","status":"affected","version":"21.3R1-EVO","versionType":"semver"},{"lessThan":"21.4R3-S3-EVO","status":"affected","version":"21.4-EVO","versionType":"semver"},{"lessThan":"22.1R3-S4-EVO","status":"affected","version":"22.1-EVO","versionType":"semver"},{"lessThan":"22.2R3-S3-EVO","status":"affected","version":"22.2-EVO","versionType":"semver"},{"lessThan":"22.3R2-S2-EVO, 22.3R3-EVO","status":"affected","version":"22.3-EVO","versionType":"semver"},{"lessThan":"22.4R2-EVO","status":"affected","version":"22.4-EVO","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>To be affected by this vulnerability the device needs to be configured with MPLS like in the following example:</p> <tt>[interfaces unit family mpls]</tt>"}],"value":"To be affected by this vulnerability the device needs to be configured with MPLS like in the following example:\n\n [interfaces unit family mpls]"}],"datePublic":"2023-10-11T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system.</p><p>When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. This issue is a prerequisite for CVE-2023-44195.</p><p>This issue affects Juniper Networks Junos OS Evolved:</p><p></p><ul><li>All versions prior to 20.4R3-S8-EVO;</li><li>21.1-EVO version 21.1R1-EVO and later;</li><li>21.2-EVO versions prior to 21.2R3-S6-EVO;</li><li>21.3-EVO version 21.3R1-EVO and later;</li><li>21.4-EVO versions prior to 21.4R3-S3-EVO;</li><li>22.1-EVO versions prior to 22.1R3-S4-EVO;</li><li>22.2-EVO versions prior to 22.2R3-S3-EVO;</li><li>22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO;</li><li>22.4-EVO versions prior to 22.4R2-EVO.</li></ul><p></p>\n\n"}],"value":"\nAn Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system.\n\nWhen specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. This issue is a prerequisite for CVE-2023-44195.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n\n\n\n  *  All versions prior to 20.4R3-S8-EVO;\n  *  21.1-EVO version 21.1R1-EVO and later;\n  *  21.2-EVO versions prior to 21.2R3-S6-EVO;\n  *  21.3-EVO version 21.3R1-EVO and later;\n  *  21.4-EVO versions prior to 21.4R3-S3-EVO;\n  *  22.1-EVO versions prior to 22.1R3-S4-EVO;\n  *  22.2-EVO versions prior to 22.2R3-S3-EVO;\n  *  22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO;\n  *  22.4-EVO versions prior to 22.4R2-EVO.\n\n\n\n\n\n\n"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-10-12T23:05:06.222Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA73162"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.4R3-S3-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R2-S2-EVO, 22.3R3-EVO, 22.4R2-EVO, 23.2R1-EVO, and all subsequent releases.</p>"}],"value":"The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.4R3-S3-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R2-S2-EVO, 22.3R3-EVO, 22.4R2-EVO, 23.2R1-EVO, and all subsequent releases.\n\n"}],"source":{"advisory":"JSA73162","defect":["1705997"],"discovery":"USER"},"timeline":[{"lang":"en","time":"2023-10-11T16:00:00.000Z","value":"Initial Publication"}],"title":"Junos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach the RE","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>"}],"value":"There are no known workarounds for this issue.\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-av217"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:59:51.639Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA73162"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T14:00:31.476860Z","id":"CVE-2023-44196","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T14:01:01.123Z"}}]}}