No analysis available yet.
Vendor Solution
The following software releases have been updated to resolve this specific issue: 19.4R3-S10, 20.2R3-S7, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R2-S2, 22.1R3, 22.2R2, 22.3R1-S1, 22.3R2, 22.4R2, 23.1R1, and all subsequent releases.
Vendor Workaround
To reduce the risk of exploitation utilize common security BCPs to limit physical access to the devices..
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32593 | An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS). When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. The device will continue to crash as long as the USB device is connected. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2, 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2; 22.4 versions prior to 22.4R2. |
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA70600 |
|
Wed, 05 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-02-05T21:42:59.703Z
Reserved: 2023-03-29T00:00:00.000Z
Link: CVE-2023-28975
Updated: 2024-08-02T13:51:38.773Z
Status : Modified
Published: 2023-04-17T22:15:09.347
Modified: 2024-11-21T07:56:19.367
Link: CVE-2023-28975
No data.
OpenCVE Enrichment
No data.
EUVD