7.5
CVSSv3

CVE-2023-44192

Published: 13/10/2023 Updated: 20/10/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based malicious user to cause memory leak, leading to Denial of Service (DoS). On all Junos OS QFX5000 Series platforms, when pseudo-VTEP (Virtual Tunnel End Point) is configured under EVPN-VXLAN scenario, and specific DHCP packets are transmitted, DMA memory leak is observed. Continuous receipt of these specific DHCP packets will cause memory leak to reach 99% and then cause the protocols to stop working and traffic is impacted, leading to Denial of Service (DoS) condition. A manual reboot of the system recovers from the memory leak. To confirm the memory leak, monitor for "sheaf:possible leak" and "vtep not found" messages in the logs. This issue affects: Juniper Networks Junos OS QFX5000 Series: * All versions before 20.4R3-S6; * 21.1 versions before 21.1R3-S5; * 21.2 versions before 21.2R3-S5; * 21.3 versions before 21.3R3-S4; * 21.4 versions before 21.4R3-S3; * 22.1 versions before 22.1R3-S2; * 22.2 versions before 22.2R2-S2, 22.2R3; * 22.3 versions before 22.3R2-S1, 22.3R3; * 22.4 versions before 22.4R1-S2, 22.4R2.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2

juniper junos 21.3

juniper junos 21.4

juniper junos 22.1

juniper junos 22.2

juniper junos 22.3

juniper junos 22.4