CVE-2023-22400
CVSS V2 None
CVSS V3 None
Description
An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS). When a specific SNMP GET operation or a specific CLI command is executed this will cause a GUID resource leak, eventually leading to exhaustion and result in an FPC crash and reboot. GUID exhaustion will trigger a syslog message like one of the following for example: evo-pfemand[<pid>]: get_next_guid: Ran out of Guid Space ... evo-aftmand-zx[<pid>]: get_next_guid: Ran out of Guid Space ... This leak can be monitored by running the following command and taking note of the value in the rightmost column labeled Guids: user@host> show platform application-info allocations app evo-pfemand | match "IFDId|IFLId|Context" Node Application Context Name Live Allocs Fails Guids re0 evo-pfemand net::juniper::interfaces::IFDId 0 3448 0 3448 re0 evo-pfemand net::juniper::interfaces::IFLId 0 561 0 561 user@host> show platform application-info allocations app evo-pfemand | match "IFDId|IFLId|Context" Node Application Context Name Live Allocs Fails Guids re0 evo-pfemand net::juniper::interfaces::IFDId 0 3784 0 3784 re0 evo-pfemand net::juniper::interfaces::IFLId 0 647 0 647 This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S3-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R3-S4-EVO; 21.3-EVO version 21.3R1-EVO and later versions; 21.4-EVO versions prior to 21.4R2-EVO.
Overview
- CVE ID
- CVE-2023-22400
- Assigner
- sirt@juniper.net
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-13T00:15:10
- Last Modified Date
- 2023-01-24T19:03:13
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://kb.juniper.net/JSA70196 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-22400 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22400 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-13 00:20:41 | Added to TrackCVE | |||
2023-01-13 00:20:42 | Weakness Enumeration | new | ||
2023-01-13 05:15:11 | 2023-01-13T05:12:35 | CVE Modified Date | updated | |
2023-01-13 05:15:11 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-19 16:15:18 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-24 19:14:07 | 2023-01-24T19:03:13 | CVE Modified Date | updated | |
2023-01-24 19:14:07 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-24 19:14:10 | CPE Information | updated |