7.5
CVSSv3

CVE-2023-36832

Published: 14/07/2023 Updated: 26/07/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series allows an unauthenticated network-based malicious user to send specific packets to an Aggregated Multiservices (AMS) interface on the device, causing the packet forwarding engine (PFE) to crash, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue is only triggered by packets destined to a local-interface via a service-interface (AMS). AMS is only supported on the MS-MPC, MS-MIC, and MX-SPC3 cards. This issue is not experienced on other types of interfaces or configurations. Additionally, transit traffic does not trigger this issue. This issue affects Juniper Networks Junos OS on MX Series: All versions before 19.1R3-S10; 19.2 versions before 19.2R3-S7; 19.3 versions before 19.3R3-S8; 19.4 versions before 19.4R3-S12; 20.2 versions before 20.2R3-S8; 20.4 versions before 20.4R3-S7; 21.1 versions before 21.1R3-S5; 21.2 versions before 21.2R3-S5; 21.3 versions before 21.3R3-S4; 21.4 versions before 21.4R3-S3; 22.1 versions before 22.1R3-S2; 22.2 versions before 22.2R3; 22.3 versions before 22.3R2-S1, 22.3R3; 22.4 versions before 22.4R1-S2, 22.4R2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos

juniper junos 19.1

juniper junos 19.2

juniper junos 19.3

juniper junos 19.4

juniper junos 20.2

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2

juniper junos 21.3

juniper junos 21.4

juniper junos 22.1

juniper junos 22.2

juniper junos 22.3

juniper junos 22.4