目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-44181— Juniper Networks Junos OS和 Junos OS QFX 安全漏洞

CVSS 7.5 · High EPSS 0.09% · P26
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-44181の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment
ソース: NVD (National Vulnerability Database)
脆弱性説明
An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog. This issue is triggered when Storm control is enabled and ICMPv6 packets are present on device. This issue affects Juniper Networks: Junos OS * All versions prior to 20.2R3-S6 on QFX5k; * 20.3 versions prior to 20.3R3-S5 on QFX5k; * 20.4 versions prior to 20.4R3-S5 on QFX5k; * 21.1 versions prior to 21.1R3-S4 on QFX5k; * 21.2 versions prior to 21.2R3-S3 on QFX5k; * 21.3 versions prior to 21.3R3-S2 on QFX5k; * 21.4 versions prior to 21.4R3 on QFX5k; * 22.1 versions prior to 22.1R3 on QFX5k; * 22.2 versions prior to 22.2R2 on QFX5k.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS和 Junos OS QFX 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS和Juniper Networks Junos OS QFX都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos OS是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。Juniper Networks Junos OS QFX是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Ju
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 0 ~ 20.2R3-S6 -

II. CVE-2023-44181の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-44181のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2023-10-12 · 25 CVEs total

CVE-2023-441948.4 HIGHJunos OS: An unauthenticated attacker with local access to the device can create a backdoo
CVE-2023-441997.5 HIGHJunos OS: MX Series: In a PTP scenario a prolonged routing protocol churn can trigger an F
CVE-2023-368417.5 HIGHJunos OS: MX Series: Receipt of malformed TCP traffic will cause a Denial of Service
CVE-2023-441977.5 HIGHJunos OS and Junos OS Evolved: An rpd crash may occur when BGP is processing newly learned
CVE-2023-368437.5 HIGHJunos OS: SRX Series: The PFE will crash on receiving malformed SSL traffic when Sky ATP i
CVE-2023-441927.5 HIGHJunos OS: QFX5000 Series: DMA memory leak is observed when specific DHCP packets are trans
CVE-2023-441917.5 HIGHJunos OS: QFX5000 Series and EX4000 Series: Denial of Service (DoS) on a large scale VLAN
CVE-2023-441857.5 HIGHJunos OS and Junos OS Evolved: In an BGP scenario RPD crashes upon receiving and processin
CVE-2023-441827.3 HIGHJunos OS and Junos OS Evolved: An Unchecked Return Value in multiple users interfaces affe
CVE-2023-223926.5 MEDIUMJunos OS: PTX Series and QFX10000 Series: Received flow-routes which aren't installed as t
CVE-2023-442046.5 MEDIUMJunos OS and Junos OS Evolved: The rpd will crash upon receiving a malformed BGP UPDATE me
CVE-2023-368396.5 MEDIUMJunos OS and Junos OS Evolved: An l2cpd crash will occur when specific LLDP packets are re
CVE-2023-441756.5 MEDIUMJunos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash
CVE-2023-441836.5 MEDIUMJunos OS: QFX5000 Series, EX4600 Series: In a VxLAN scenario an adjacent attacker within t
CVE-2023-441846.5 MEDIUMJunos OS and Junos OS Evolved: High CPU load due to specific NETCONF command
CVE-2023-441966.5 MEDIUMJunos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach
CVE-2023-442036.5 MEDIUMJunos OS: QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600: Packet flooding will
CVE-2023-441985.8 MEDIUMJunos OS: SRX Series and MX Series: SIP ALG doesn't drop specifically malformed retransmit
CVE-2023-441935.5 MEDIUMJunos OS: MX Series: An FPC crash is observed when CFM is enabled in a VPLS scenario and a
CVE-2023-441785.5 MEDIUMJunos OS : Stack overflow vulnerability in CLI command processing

Showing 20 of 25 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2023-44181へのコメント

まだコメントはありません


コメントを残す