A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K Series devices allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Specific packets are being incorrectly routed to a queue used for other high-priority traffic such as BGP, PIM, ICMP, ICMPV6 ND and ISAKMP. Due to this misclassification of traffic, receipt of a high rate of these specific packets will cause delays in the processing of other traffic, leading to a Denial of Service (DoS). Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on ACX2K Series: All versions prior to 19.4R3-S9; All 20.2 versions; 20.3 versions prior to 20.3R3-S6 on ACX2K Series; 20.4 versions prior to 20.4R3-S4 on ACX2K Series; All 21.1 versions; 21.2 versions prior to 21.2R3-S3 on ACX2K Series. Note: This issues affects legacy ACX2K Series PPC-based devices. This platform reached Last Supported Version (LSV) as of the Junos OS 21.2 Release.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA70187 | Vendor Advisory |
https://kb.juniper.net/JSA70187 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-13 00:15
Updated : 2024-11-21 07:44
NVD link : CVE-2023-22391
Mitre link : CVE-2023-22391
CVE.ORG link : CVE-2023-22391
JSON object : View
Products Affected
juniper
- junos
CWE
CWE-755
Improper Handling of Exceptional Conditions