Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32599 | An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R3-S6-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases. Junos OS: 20.3R3-S5, 20.4R3-S3, 21.1R3-S4, 21.2R3, 21.3R3, 21.4R2, 22.1R2, 22.2R1, and all subsequent releases.
Workaround
If the receipt of router advertisements is not necessary (but just the solicited or unsolicited sending of RAs) then incoming RAs can be filtered and dropped by applying a firewall filter like the following: set firewall family inet6 filter test term 1 from next-header icmp6 set firewall family inet6 filter test term 1 from icmp-type 134 set firewall family inet6 filter test term 1 then discard set firewall family inet6 filter test term 2 then accept
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA70607 |
|
Wed, 05 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-02-05T21:40:20.322Z
Reserved: 2023-03-29T00:00:00.000Z
Link: CVE-2023-28981
Updated: 2024-08-02T13:51:39.003Z
Status : Modified
Published: 2023-04-17T22:15:09.687
Modified: 2024-11-21T07:56:20.093
Link: CVE-2023-28981
No data.
OpenCVE Enrichment
No data.
EUVD