CERT-In Vulnerability Note
CIVN-2023-0311
Multiple Vulnerabilities in Juniper Junos OS
Original Issue Date:October 18, 2023
Severity Rating: HIGH
Software Affected
- Juniper Networks Junos OS 18.4 version 18.4R2 and later versions prior to 20.4R3-S8
- Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5 on QFX5k
- Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S5
- Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S5 on QFX5k
- Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S9
- Juniper Networks Junos OS 21.1 version 21.1R1 and later versions
- Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.2R3-S6
- Juniper Networks Junos OS 21.1 version 21.1R1-EVO and later versions
- Juniper Networks Junos OS 21.1 versions 21.1R1 and later
- Juniper Networks Junos OS 21.1 versions 21.1R1-EVO and later
- Juniper Networks Junos OS 21.1 versions prior to 21.1R3-S2-EVO
- Juniper Networks Junos OS 21.1 versions prior to 21.1R3-S4
- Juniper Networks Junos OS 21.1 versions prior to 21.1R3-S4 on QFX5k
- Juniper Networks Junos OS 21.1 versions prior to 21.1R3-S5
- Juniper Networks Junos OS 21.1-EVO version 21.1R1 and later versions
- Juniper Networks Junos OS 21.1-EVO version 21.1R1-EVO and later
- Juniper Networks Junos OS 21.1-EVO version 21.1R1-EVO and later versions
- Juniper Networks Junos OS 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO
- Juniper Networks Junos OS 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S6-EVO
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S2
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S2-EVO
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S3
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S3 on QFX5k
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S4
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S5
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S5-EVO
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S6
- Juniper Networks Junos OS 21.2 versions prior to 21.2R3-S6-EVO
- Juniper Networks Junos OS 21.2-EVO version 21.2R1 and later versions
- Juniper Networks Junos OS 21.2-EVO versions prior to 21.2R3-S2-EVO
- Juniper Networks Junos OS 21.2-EVO versions prior to 21.2R3-S6-EVO
- Juniper Networks Junos OS 21.3 versions prior to 21.3R2-S2, 21.3R3-S1
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S1-EVO
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S2 on QFX5k
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S3
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S4
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S4-EVO
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S5
- Juniper Networks Junos OS 21.3 versions prior to 21.3R3-S5-EVO
- Juniper Networks Junos OS 21.3-EVO version 21.3R1-EVO and later
- Juniper Networks Junos OS 21.3-EVO version 21.3R1-EVO and later versions
- Juniper Networks Junos OS 21.3-EVO versions prior to 21.3R3-S2-EVO
- Juniper Networks Junos OS 21.3-EVO versions prior to 21.3R3-S3-EVO
- Juniper Networks Junos OS 21.3-EVO versions prior to 21.3R3-S5-EVO
- Juniper Networks Junos OS 21.4 versions prior to 21.4R2-S1, 21.4R3
- Juniper Networks Junos OS 21.4 versions prior to 21.4R2-S1, 21.4R3-S5
- Juniper Networks Junos OS 21.4 versions prior to 21.4R2-S2, 21.4R3
- Juniper Networks Junos OS 21.4 versions prior to 21.4R2-S2-EVO
- Juniper Networks Junos OS 21.4 versions prior to 21.4R3
Juniper Networks Junos OS 21.4 versions prior to 21.4R3 on QFX5k
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S1
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S2
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S3
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S3-EVO
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S4
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S4-EVO
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S5
Juniper Networks Junos OS 21.4 versions prior to 21.4R3-S5-EVO
Juniper Networks Junos OS 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO
Juniper Networks Junos OS 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-S5-EVO
Juniper Networks Junos OS 21.4-EVO versions prior to 21.4R3-S3-EVO
Juniper Networks Junos OS 21.4-EVO versions prior to 21.4R3-S4-EVO
Juniper Networks Junos OS 22.1 versions prior to 22.1R1-S2, 22.1R2
Juniper Networks Junos OS 22.1 versions prior to 22.1R2-S2, 22.1R3
Juniper Networks Junos OS 22.1 versions prior to 22.1R3
Juniper Networks Junos OS 22.1 versions prior to 22.1R3 on QFX5k
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S1
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S2
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S2-EVO
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S3
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S3-EVO
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S4
Juniper Networks Junos OS 22.1 versions prior to 22.1R3-S4-EVO
Juniper Networks Junos OS 22.1-EVO version 22.1R1-EVO and later
Juniper Networks Junos OS 22.1-EVO version 22.1R1-EVO and later versions prior to 22.2R2-S2-EVO, 22.2R3-EVO
Juniper Networks Junos OS 22.1-EVO versions prior to 22.1R3-EVO
Juniper Networks Junos OS 22.1-EVO versions prior to 22.1R3-S3-EVO
Juniper Networks Junos OS 22.1-EVO versions prior to 22.1R3-S4-EVO
Juniper Networks Junos OS 22.2 versions 22.2R1-EVO and later
Juniper Networks Junos OS 22.2 versions prior to 22.2R1-S1, 22.2R2
Juniper Networks Junos OS 22.2 versions prior to 22.2R2
Juniper Networks Junos OS 22.2 versions prior to 22.2R2 on QFX5k
Juniper Networks Junos OS 22.2 versions prior to 22.2R2-EVO
Juniper Networks Junos OS 22.2 versions prior to 22.2R2-S1, 22.2R3
Juniper Networks Junos OS 22.2 versions prior to 22.2R2-S2, 22.2R3
Juniper Networks Junos OS 22.2 versions prior to 22.2R3
Juniper Networks Junos OS 22.2 versions prior to 22.2R3-EVO
Juniper Networks Junos OS 22.2 versions prior to 22.2R3-S1
Juniper Networks Junos OS 22.2 versions prior to 22.2R3-S1-EVO
Juniper Networks Junos OS 22.2 versions prior to 22.2R3-S2
Juniper Networks Junos OS 22.2 versions prior to 22.2R3-S2-EVO
Juniper Networks Junos OS 22.2 versions prior to 22.2R3-S3-EVO
Juniper Networks Junos OS 22.2-EVO version 22.2R1-EVO and later
Juniper Networks Junos OS 22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO
Juniper Networks Junos OS 22.2-EVO versions prior to 22.2R3-S2-EVO
Juniper Networks Junos OS 22.2-EVO versions prior to 22.2R3-S3-EVO
Juniper Networks Junos OS 22.3 versions prior to 22.3R1-S2, 22.3R2
Juniper Networks Junos OS 22.3 versions prior to 22.3R1-S2, 22.3R2.
Juniper Networks Junos OS 22.3 versions prior to 22.3R2
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S1, 22.3R3
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S1, 22.3R3-S1
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S2
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S2, 22.3R3
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S2, 22.3R3-S1
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S2-EVO
Juniper Networks Junos OS 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO
Juniper Networks Junos OS 22.3 versions prior to 22.3R3
Juniper Networks Junos OS 22.3 versions prior to 22.3R3-EVO
Juniper Networks Junos OS 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO
Juniper Networks Junos OS 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO
Juniper Networks Junos OS 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO
Juniper Networks Junos OS 22.4 versions prior to 22.4R1-S1-EVO
Juniper Networks Junos OS 22.4 versions prior to 22.4R1-S2, 22.4R2
Juniper Networks Junos OS 22.4 versions prior to 22.4R2
Juniper Networks Junos OS 22.4 versions prior to 22.4R2-EVO
Juniper Networks Junos OS 22.4 versions prior to 22.4R2-EVO.
Juniper Networks Junos OS 22.4 versions prior to 22.4R2-S1, 22.4R3
Juniper Networks Junos OS 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO
Juniper Networks Junos OS 22.4 versions prior to 22.4R2-S2, 22.4R3
Juniper Networks Junos OS 22.4 versions prior to 22.4R3
Juniper Networks Junos OS 22.4 versions prior to 22.4R3-EVO
Juniper Networks Junos OS 22.4-EVO versions prior to 22.4R2-EVO
Juniper Networks Junos OS 22.4-EVO versions prior to 22.4R2-S1-EVO, 22.4R3-EVO
Juniper Networks Junos OS 22.4-EVO versions prior to 22.4R3-EVO
Juniper Networks Junos OS 23.1 versions prior to 23.1R2
Juniper Networks Junos OS 23.2 versions prior to 23.2R1, 23.2R2
Juniper Networks Junos OS 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO
Juniper Networks Junos OS 23.2 versions prior to 23.2R2
Juniper Networks Junos OS 23.2 versions prior to 23.2R2-EVO
Juniper Networks Junos OS 23.2-EVO versions prior to 23.2R1-EVO
Juniper Networks Junos OS All versions prior to 20.2R3-S6 on QFX5k
Juniper Networks Junos OS All versions prior to 20.4R3-S4
Juniper Networks Junos OS All versions prior to 20.4R3-S4-EVO
Juniper Networks Junos OS All versions prior to 20.4R3-S5
Juniper Networks Junos OS All versions prior to 20.4R3-S6
Juniper Networks Junos OS All versions prior to 20.4R3-S6-EVO
Juniper Networks Junos OS All versions prior to 20.4R3-S7
Juniper Networks Junos OS All versions prior to 20.4R3-S7-EVO
Juniper Networks Junos OS All versions prior to 20.4R3-S8
Juniper Networks Junos OS All versions prior to 20.4R3-S8, 20.4R3-S9
Juniper Networks Junos OS All versions prior to 20.4R3-S8-EVO
Juniper Networks Junos OS All versions prior to 21.4R3-S3-EVO
Juniper Networks Junos OS All versions prior to 21.4R3-S4-EVO
Juniper Networks Junos OS All versions prior to 21.4R3-S5-EVO
Juniper Networks Junos OS All versions prior to 22.3R3-EVO
Overview
Multiple vulnerabilities have been reported in Juniper Networks Junos OS which could be exploited by an attacker to trigger denial of service condition, elevation of privilege, remote code execution, security restriction bypass, sensitive information disclosure and data manipulation on the targeted system.
Description
These vulnerabilities affect multiple components of Juniper Networks Junos OS. An attacker could exploit these vulnerabilities by sending a specially crafted request on the targeted system.
Successful exploitation of these vulnerabilities could allow an attacker to trigger denial of service condition, elevation of privilege, remote code execution, security restriction bypass, sensitive information disclosure and data manipulation on the targeted system.
Solution
Apply appropriate updates as mentioned in security advisory.
Vendor Information
Juniper
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-An-unauthenticated-attacker-with-local-access-to-the-device-can-create-a-backdoor-with-root-privileges-CVE-2023-44194
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10001-PTX10004-PTX10008-PTX10016-MAC-address-validation-bypass-vulnerability-CVE-2023-44190
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-MAC-address-validation-bypass-vulnerability-CVE-2023-44189
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44196
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44195
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-packets-will-bypass-a-control-plane-firewall-filter-CVE-2023-44202
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-file-copy-CLI-command-can-disclose-password-to-shell-users-CVE-2023-44187
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-is-observed-when-CFM-is-enabled-in-a-VPLS-scenario-and-a-specific-LDP-related-command-is-run-CVE-2023-44193
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-In-a-PTP-scenario-a-prolonged-routing-protocol-churn-can-trigger-an-FPC-reboot-CVE-2023-44199
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-Receipt-of-malformed-TCP-traffic-will-cause-a-Denial-of-Service-CVE-2023-36841
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Received-flow-routes-which-aren-t-installed-as-the-hardware-doesn-t-support-them-lead-to-an-FPC-heap-memory-leak-CVE-2023-22392
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-DMA-memory-leak-is-observed-when-specific-DHCP-packets-are-transmitted-over-pseudo-VTEP-CVE-2023-44192
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-EX4600-Series-In-a-VxLAN-scenario-an-adjacent-attacker-within-the-VxLAN-sending-genuine-packets-may-cause-a-DMA-memory-leak-to-occur-CVE-2023-44183
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4000-Series-Denial-of-Service-DoS-on-a-large-scale-VLAN-due-to-PFE-hogging-CVE-2023-44191
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-series-EX2300-EX3400-EX4100-EX4400-and-EX4600-Packet-flooding-will-occur-when-IGMP-traffic-is-sent-to-an-isolated-VLAN-CVE-2023-44203
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5k-l2-loop-in-the-overlay-impacts-the-stability-in-a-EVPN-VXLAN-environment-CVE-2023-44181
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-SIP-ALG-doesn-t-drop-specifically-malformed-retransmitted-SIP-packets-CVE-2023-44198
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Vulnerability-fixed-in-OpenSSL
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-local-attacker-can-retrieve-sensitive-information-and-elevate-privileges-on-the-devices-to-an-authorized-user-CVE-2023-44201
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-Unchecked-Return-Value-in-multiple-users-interfaces-affects-confidentiality-and-integrity-of-device-operations-CVE-2023-44182
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-l2cpd-crash-will-occur-when-specific-LLDP-packets-are-received-CVE-2023-36839
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-may-occur-when-BGP-is-processing-newly-learned-routes-CVE-2023-44197
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-High-CPU-load-due-to-specific-NETCONF-command-CVE-2023-44184
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-NTP-vulnerabilities-resolved
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-attempting-to-send-a-very-long-AS-PATH-to-a-non-4-byte-AS-capable-BGP-neighbor-CVE-2023-44186
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-genuine-PIM-packet-causes-RPD-crash-CVE-2023-44175
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-will-crash-upon-receiving-a-malformed-BGP-UPDATE-message-CVE-2023-44204
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-jkdsd-crash-due-to-multiple-telemetry-requests-CVE-2023-44188
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-Vulnerabilities-in-CLI-command
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-The-PFE-will-crash-on-receiving-malformed-SSL-traffic-when-ATP-is-enabled-CVE-2023-36843
https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-scenario-RPD-crashes-upon-receiving-and-processing-a-specific-malformed-ISO-VPN--BGP-UPDATE-packet-CVE-2023-44185
CVE Name
CVE-2022-2097
CVE-2022-2274
CVE-2023-22392
CVE-2023-26551
CVE-2023-26552
CVE-2023-26553
CVE-2023-26554
CVE-2023-26555
CVE-2023-36839
CVE-2023-36841
CVE-2023-36843
CVE-2023-44175
CVE-2023-44176
CVE-2023-44177
CVE-2023-44178
CVE-2023-44181
CVE-2023-44182
CVE-2023-44183
CVE-2023-44184
CVE-2023-44185
CVE-2023-44186
CVE-2023-44187
CVE-2023-44188
CVE-2023-44189
CVE-2023-44190
CVE-2023-44191
CVE-2023-44192
CVE-2023-44193
CVE-2023-44194
CVE-2023-44195
CVE-2023-44196
CVE-2023-44197
CVE-2023-44198
CVE-2023-44199
CVE-2023-44201
CVE-2023-44202
CVE-2023-44203
CVE-2023-44204
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|