Input validation error in Juniper Junos OS and Junos OS Evolved - CVE-2023-4481

 

Input validation error in Juniper Junos OS and Junos OS Evolved - CVE-2023-4481

Published: August 29, 2023 / Updated: October 2, 2023


Vulnerability identifier: #VU80111
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-4481
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Juniper Junos OS
Junos OS Evolved
Software vendor:
Juniper Networks, Inc.

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the Routing Protocol Daemon (rpd). A remote attacker can send specially crafted BGP UPDATE messages over an established BGP session and perform a denial of service (DoS) attack.

This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations but requires a remote attacker to have at least one established BGP session.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

The vendor is preparing to resolve the vulnerability in the upcoming releases:

Junos OS: 23.4R1*, and all subsequent releases.

Junos OS Evolved: 23.4R1-EVO*, and all subsequent releases.


External links