Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36842— Junos OS: jdhcpd will hang on receiving a specific DHCP packet

CVSS 6.5 · Medium EPSS 0.04% · P11
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-36842

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: jdhcpd will hang on receiving a specific DHCP packet
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause the jdhcpd to consume all the CPU cycles resulting in a Denial of Service (DoS). On Junos OS devices with forward-snooped-client configured, if an attacker sends a specific DHCP packet to a non-configured interface, this will cause an infinite loop. The DHCP process will have to be restarted to recover the service. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对异常条件检查或处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS 存在安全漏洞,该漏洞源于 Juniper DHCP Daemon (jdhcpd) 中存在对异常或异常情况的不当检查漏洞。允许相邻的、未经身份验证的攻击者导致 jdhcpd 消耗所有 CPU 周期。从而导致拒绝服务 (DoS)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 0 ~ 20.4R3-S9 -

II. Public POCs for CVE-2023-36842

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-36842

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2024-01-12 · 23 CVEs total

CVE-2024-215919.8 CRITICALJunos OS: SRX Series and EX Series: Security Vulnerability in J-web allows a preAuth Remot
CVE-2024-216047.5 HIGHJunos OS Evolved: A high rate of specific traffic will cause a complete system outage
CVE-2024-215957.5 HIGHJunos OS: EX4100, EX4400, EX4600, QFX5000 Series: A high rate of specific ICMP traffic wil
CVE-2024-216027.5 HIGHJunos OS Evolved: ACX7024, ACX7100-32C and ACX7100-48L: Traffic stops when a specific IPv4
CVE-2024-216067.5 HIGHJunos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flo
CVE-2024-216117.5 HIGHJunos OS and Junos OS Evolved: In a jflow scenario continuous route churn will cause a mem
CVE-2024-216127.5 HIGHJunos OS Evolved: Specific TCP traffic causes OFP core and restart of RE
CVE-2024-216147.5 HIGHJunos OS and Junos OS Evolved: A specific query via DREND causes rpd crash
CVE-2024-216167.5 HIGHJunos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allo
CVE-2024-215897.4 HIGHParagon Active Assurance Control Center: Information disclosure vulnerability
CVE-2024-216176.5 MEDIUMJunos OS: BGP flap on NSR-enabled devices causes memory leak
CVE-2024-216036.5 MEDIUMJunos OS: MX Series: Gathering statistics in a scaled SCU/DCU configuration will lead to a
CVE-2024-216136.5 MEDIUMJunos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd c
CVE-2024-215876.5 MEDIUMJunos OS: MX Series: Memory leak in bbe-smgd process if BFD liveness detection for DHCP su
CVE-2024-216006.5 MEDIUMJunos OS: PTX Series: In an FTI scenario MPLS packets hitting reject next-hop will cause a
CVE-2024-215996.5 MEDIUMJunos OS: MX Series: MPC3E memory leak with PTP configuration
CVE-2024-215855.9 MEDIUMJunos OS and Junos OS Evolved: BGP session flaps on NSR-enabled devices can cause rpd cras
CVE-2024-216015.9 MEDIUMJunos OS: SRX Series: Due to an error in processing TCP events flowd will crash
CVE-2024-215945.5 MEDIUMJunos OS: SRX 5000 Series: Repeated execution of a specific CLI command causes a flowd cra
CVE-2024-215965.3 MEDIUMJunos OS and Junos OS Evolved: A specific BGP UPDATE message will cause a crash in the bac

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-36842

No comments yet


Leave a comment