Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-36834 |
CWE-ID | CWE-372 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
Juniper Junos OS Operating systems & Components / Operating system |
Vendor | Juniper Networks, Inc. |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU78261
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-36834
CWE-ID:
CWE-372 - Incomplete Internal State Distinction
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series. If an SRX is configured in L2 transparent mode the receipt of a specific
genuine packet can cause a single Packet Processing Engines (PPE)
component of the PFE to run into a loop, which in turn will render the
PPE unavailable. Each packet will cause one PPE to get into a loop,
leading to a gradual performance degradation until all PPEs are
unavailable and all traffic processing stops.
Install updates from vendor's website.
Vulnerable software versionsJuniper Junos OS: 20.2R1-S1 - 22.3R1
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.