NA

CVE-2023-44181

Published: 13/10/2023 Updated: 20/10/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog. This issue is triggered when Storm control is enabled and ICMPv6 packets are present on device. This issue affects Juniper Networks: Junos OS * All versions before 20.2R3-S6 on QFX5k; * 20.3 versions before 20.3R3-S5 on QFX5k; * 20.4 versions before 20.4R3-S5 on QFX5k; * 21.1 versions before 21.1R3-S4 on QFX5k; * 21.2 versions before 21.2R3-S3 on QFX5k; * 21.3 versions before 21.3R3-S2 on QFX5k; * 21.4 versions before 21.4R3 on QFX5k; * 22.1 versions before 22.1R3 on QFX5k; * 22.2 versions before 22.2R2 on QFX5k.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos

juniper junos 20.2

juniper junos 20.3

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2

juniper junos 21.3

juniper junos 21.4

juniper junos 22.1

juniper junos 22.2