Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32585 | A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS: 21.1R3-S5, 21.2R3-S2, 21.3R3-S2, 21.4R3, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases. Junos OS Evolved: 21.4R3-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, and all subsequent releases.
Workaround
There are no known workarounds for this issue. To reduce the risk of exploitation utilize common security BCPs to limit the exploitable surface by disallowing access to all BGP services on networks and devices to only trusted systems, administrators, networks and hosts.
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA70591 |
|
Wed, 05 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-02-05T21:46:57.008Z
Reserved: 2023-03-29T00:00:00.000Z
Link: CVE-2023-28967
Updated: 2024-08-02T13:51:38.962Z
Status : Modified
Published: 2023-04-17T22:15:08.890
Modified: 2024-11-21T07:56:18.400
Link: CVE-2023-28967
No data.
OpenCVE Enrichment
No data.
EUVD