CVE-2023-22407 - Incomplete Cleanup

Severity

65%

Complexity

27%

Confidentiality

60%

An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). An rpd crash can occur when an MPLS TE tunnel configuration change occurs on a directly connected router. This issue affects: Juniper Networks Junos OS All versions prior to 18.4R2-S7; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2. Juniper Networks Junos OS Evolved All versions prior to 19.2R3-EVO; 19.3 versions prior to 19.3R3-EVO; 19.4 versions prior to 19.4R3-EVO; 20.1 versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R2-EVO.

CVSS 3.1 Base Score 6.5. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Demo Examples

Incomplete Cleanup

CWE-459

Stream resources in a Java application should be released in a finally block, otherwise an exception thrown before the call to close() would result in an unreleased I/O resource. In the example below, the close() method is called in the try block (incorrect).


               
}
is.close();
log.error("Something bad happened: " + t.getMessage());

Overview

Type

Juniper

First reported 2 years ago

2023-01-13 00:15:00

Last updated 2 years ago

2023-01-20 07:57:00

Affected Software

Juniper JunOS 18.4 R1

18.4

Juniper JUNOS 18.4

18.4

Juniper Junos OS 18.4 R1-S1

18.4

Juniper JUNOS 18.4R1-S2

18.4

Juniper Junos OS 19.1 R1

19.1

Juniper Junos OS 19.1

19.1

Juniper Junos OS 19.2 R1

19.2

Juniper JUNOS 18.4R2

18.4

Juniper Junos OS 19.1 R1-s1

19.1

Juniper JUNOS 19.1 R1-S3

19.1

Juniper JUNOS 19.1 R1-S2

19.1

Juniper JUNOS 18.4 R1-S5

18.4

Juniper JUNOS 19.2 R1-S1

19.2

Juniper JUNOS 19.2 R1-S2

19.2

Juniper JUNOS 18.4 R2-S1

18.4

Juniper JUNOS 19.3

19.3

Juniper JUNOS 19.3 R1

19.3

Juniper Junos OS 19.2

19.2

Juniper JUNOS 18.4 R2-S2

18.4

Juniper JUNOS 19.2 R1-S3

19.2

Juniper JUNOS 19.4 R1

19.4

Juniper JUNOS 19.3 R2

19.3

Juniper Junos OS 19.1 R2

19.1

Juniper JUNOS 18.4 R2-S3

18.4

Juniper JUNOS 19.3 R2-S1

19.3

Juniper JUNOS 19.3 R1-S1

19.3

Juniper JUNOS 20.1 R1

20.1

Juniper JUNOS 19.4 R1-S1

19.4

Juniper JUNOS 19.3 R2-S2

19.3

Juniper JUNOS 19.1 R1-S4

19.1

Juniper JUNOS 18.4 R1-S6

18.4

Juniper JUNOS

Juniper JUNOS OS Evolved 19.3 R1

19.3

Juniper JUNOS OS Evolved 19.3 R2

19.3

Juniper JUNOS OS Evolved 19.2 R1

19.2

Juniper JUNOS OS Evolved 19.2 R2

19.2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.