{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-44197","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-09-26T19:30:32.349Z","datePublished":"2023-10-12T23:05:23.526Z","dateUpdated":"2024-09-19T13:07:14.586Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S8","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*","status":"affected","version":"21.1R1","versionType":"semver"},{"lessThan":"21.2R3-S2","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S5","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R2-S1, 21.4R3-S5","status":"affected","version":"21.4","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S8-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.1*-EVO","status":"affected","version":"21.1R1-EVO","versionType":"semver"},{"lessThan":"21.2R3-S2-EVO","status":"affected","version":"21.2-EVO","versionType":"semver"},{"lessThan":"21.3*-EVO","status":"affected","version":"21.3R1-EVO","versionType":"semver"},{"lessThan":"21.4R2-S1-EVO, 21.4R3-S5-EVO","status":"affected","version":"21.4-EVO","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>To be affected a device needs to be configured with at least one BGP peer and an import policy applicable to it which contains the respective match condition:</p><code>[ protocols bgp group &lt;group&gt; neighbor &lt;IP-address&gt; ]</code><br><code>[ protocols bgp ... import &lt;policy-name&gt; ]</code><br><code>[ policy-options policy-statement &lt;policy-name&gt; term &lt;term-name&gt; from route-filter ...]</code>\n\n"}],"value":"\nTo be affected a device needs to be configured with at least one BGP peer and an import policy applicable to it which contains the respective match condition:\n\n[ protocols bgp group <group> neighbor <IP-address> ]\n[ protocols bgp ... import <policy-name> ]\n[ policy-options policy-statement <policy-name> term <term-name> from route-filter ...]\n\n"}],"datePublic":"2023-10-11T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>An Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).</p><p>On all Junos OS and Junos OS Evolved devices an rpd crash and restart can occur while processing BGP route updates received over an established BGP session. This specific issue is observed for BGP routes learned via a peer which is configured with a BGP import policy that has hundreds of terms matching IPv4 and/or IPv6 prefixes.</p><p>This issue affects Juniper Networks Junos OS:</p><p></p><ul><li>All versions prior to 20.4R3-S8;</li><li>21.1 version 21.1R1 and later versions;</li><li>21.2 versions prior to 21.2R3-S2;</li><li>21.3 versions prior to 21.3R3-S5;</li><li>21.4 versions prior to 21.4R2-S1, 21.4R3-S5.</li></ul><p></p><p>This issue affects Juniper Networks Junos OS Evolved:</p><p></p><ul><li>All versions prior to 20.4R3-S8-EVO;</li><li>21.1-EVO version 21.1R1-EVO and later versions;</li><li>21.2-EVO versions prior to 21.2R3-S2-EVO;</li><li>21.3-EVO version 21.3R1-EVO and later versions;</li><li>21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-S5-EVO.</li></ul><p></p>\n\n"}],"value":"\nAn Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved devices an rpd crash and restart can occur while processing BGP route updates received over an established BGP session. This specific issue is observed for BGP routes learned via a peer which is configured with a BGP import policy that has hundreds of terms matching IPv4 and/or IPv6 prefixes.\n\nThis issue affects Juniper Networks Junos OS:\n\n\n\n  *  All versions prior to 20.4R3-S8;\n  *  21.1 version 21.1R1 and later versions;\n  *  21.2 versions prior to 21.2R3-S2;\n  *  21.3 versions prior to 21.3R3-S5;\n  *  21.4 versions prior to 21.4R2-S1, 21.4R3-S5.\n\n\n\n\nThis issue affects Juniper Networks Junos OS Evolved:\n\n\n\n  *  All versions prior to 20.4R3-S8-EVO;\n  *  21.1-EVO version 21.1R1-EVO and later versions;\n  *  21.2-EVO versions prior to 21.2R3-S2-EVO;\n  *  21.3-EVO version 21.3R1-EVO and later versions;\n  *  21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-S5-EVO.\n\n\n\n\n\n\n"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-10-12T23:05:23.526Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA73163"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue:</p><p>Junos OS: 20.4R3-S8, 21.2R3-S2, 21.3R3-S5, 21.4R2-S1, 21.4R3-S5, 22.1R1, and all subsequent releases.</p><p>Junos OS Evolved: 20.4R3-S8-EVO, 21.2R3-S2-EVO, 21.4R2-S1-EVO, 21.4R3-S5-EVO, 22.1R1-EVO, and all subsequent releases.</p>"}],"value":"The following software releases have been updated to resolve this specific issue:\n\nJunos OS: 20.4R3-S8, 21.2R3-S2, 21.3R3-S5, 21.4R2-S1, 21.4R3-S5, 22.1R1, and all subsequent releases.\n\nJunos OS Evolved: 20.4R3-S8-EVO, 21.2R3-S2-EVO, 21.4R2-S1-EVO, 21.4R3-S5-EVO, 22.1R1-EVO, and all subsequent releases.\n\n"}],"source":{"advisory":"JSA73163","defect":["1626717"],"discovery":"INTERNAL"},"timeline":[{"lang":"en","time":"2023-10-11T16:00:00.000Z","value":"Initial Publication"}],"title":"Junos OS and Junos OS Evolved: An rpd crash may occur when BGP is processing newly learned routes","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>"}],"value":"There are no known workarounds for this issue.\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-av217"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:59:51.297Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA73163"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-19T13:07:06.524872Z","id":"CVE-2023-44197","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-19T13:07:14.586Z"}}]}}