An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS). When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. The device will continue to crash as long as the USB device is connected. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2, 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2; 22.4 versions prior to 22.4R2.
Metrics
No CVSS v4.0
Attack Vector Physical
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Juniper |
|
Configuration 1 [-]
|
No data.
References
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA70600 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2023-04-17T00:00:00
Updated: 2024-08-02T13:51:38.773Z
Reserved: 2023-03-29T00:00:00
Link: CVE-2023-28975
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-04-17T22:15:09.347
Modified: 2024-11-21T07:56:19.367
Link: CVE-2023-28975
Redhat
No data.