CVE-2023-22398 - Access of Uninitialized Pointer

Severity

53%

Complexity

16%

Confidentiality

60%

An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). When an MPLS ping is performed on BGP LSPs, the RPD might crash. Repeated execution of this operation will lead to a sustained DoS. This issue affects: Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S12; 19.1 versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R1-S1, 21.1R2; Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R2-EVO.

CVSS 3.1 Base Score 5.3. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS 3.1 Base Score 5.5. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

Overview

Type

Juniper

First reported 2 years ago

2023-01-13 00:15:00

Last updated 2 years ago

2023-01-24 18:59:00

Affected Software

Juniper Junos OS 15.1 R7

15.1

Juniper JunOS 15.1 F1

15.1

Juniper Junos 15.1 F6-S4

15.1

Juniper Junos 15.1 F2-S3

15.1

Juniper JunOS 15.1 F7

15.1

Juniper Junos 15.1 R3

15.1

Juniper Junos 15.1 F2-S2

15.1

Juniper JunOS 15.1 R6

15.1

Juniper Junos 15.1 F4

15.1

Juniper JunOS 15.1 R4

15.1

Juniper Junos 15.1 F2-S4

15.1

Juniper Junos 15.1 F5-S7

15.1

Juniper Junos 15.1 F6-S7

15.1

Juniper JUNOS 15.1 F6

15.1

Juniper JunOS 15.1 F2

15.1

Juniper Junos 15.1 A1

15.1

Juniper Junos 15.1 F3

15.1

Juniper JunOS 15.1 R2

15.1

Juniper Junos 15.1 R4-S7

15.1

Juniper Junos 15.1 R4-S8

15.1

Juniper Junos 15.1 R5-S5

15.1

Juniper Junos 15.1 R6-S1

15.1

Juniper JunOS 15.1 R5

15.1

Juniper Junos 15.1 R1

15.1

Juniper JunOS 15.1 F2-s1

15.1

Juniper Junos 15.1 R5-S1

15.1

Juniper Junos 15.1 F5

15.1

Juniper JUNOS 15.1 R5-S6

15.1

Juniper JUNOS 15.1 R6-S2

15.1

Juniper Junos 15.1 R4-S9

15.1

Juniper Junos 15.1 R6-S6

15.1

Juniper JUNOS 15.1 F6-S3

15.1

Juniper JUNOS 15.1 R7-S1

15.1

Juniper JUNOS 15.1 R7-S2

15.1

Juniper JUNOS 15.1 R7-S3

15.1

Juniper JUNOS 15.1 F6-s2

15.1

Juniper JUNOS 15.1 F6-s1

15.1

Juniper Junos OS 15.1

15.1

Juniper Junos OS 19.1 R1

19.1

Juniper Junos OS 19.1

19.1

Juniper Junos OS 19.2 R1

19.2

Juniper Junos OS 19.1 R1-s1

19.1

Juniper JUNOS 19.1 R1-S3

19.1

Juniper JUNOS 19.1 R1-S2

19.1

Juniper Junos OS 15.1 R7-s4

15.1

Juniper Junos OS 15.1 R7-s5

15.1

Juniper Junos OS 15.1 F6-s12

15.1

Juniper JUNOS 19.2 R1-S1

19.2

Juniper JUNOS 19.2 R1-S2

19.2

Juniper JUNOS 19.3

19.3

Juniper JUNOS 19.3 R1

19.3

Juniper Junos OS 19.2

19.2

Juniper JUNOS 19.2 R1-S3

19.2

Juniper JUNOS 19.4 R1

19.4

Juniper JUNOS 19.3 R2

19.3

Juniper Junos OS 19.1 R2

19.1

Juniper JUNOS 19.3 R2-S1

19.3

Juniper JUNOS 19.3 R1-S1

19.3

Juniper JUNOS 20.1 R1

20.1

Juniper JUNOS 19.4 R1-S1

19.4

Juniper JUNOS 19.3 R2-S2

19.3

Juniper JUNOS 19.1 R1-S4

19.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.