CVE-2023-22400

CVSS V2 None CVSS V3 None
Description
An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS). When a specific SNMP GET operation or a specific CLI command is executed this will cause a GUID resource leak, eventually leading to exhaustion and result in an FPC crash and reboot. GUID exhaustion will trigger a syslog message like one of the following for example: evo-pfemand[<pid>]: get_next_guid: Ran out of Guid Space ... evo-aftmand-zx[<pid>]: get_next_guid: Ran out of Guid Space ... This leak can be monitored by running the following command and taking note of the value in the rightmost column labeled Guids: user@host> show platform application-info allocations app evo-pfemand | match "IFDId|IFLId|Context" Node Application Context Name Live Allocs Fails Guids re0 evo-pfemand net::juniper::interfaces::IFDId 0 3448 0 3448 re0 evo-pfemand net::juniper::interfaces::IFLId 0 561 0 561 user@host> show platform application-info allocations app evo-pfemand | match "IFDId|IFLId|Context" Node Application Context Name Live Allocs Fails Guids re0 evo-pfemand net::juniper::interfaces::IFDId 0 3784 0 3784 re0 evo-pfemand net::juniper::interfaces::IFLId 0 647 0 647 This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S3-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R3-S4-EVO; 21.3-EVO version 21.3R1-EVO and later versions; 21.4-EVO versions prior to 21.4R2-EVO.
Overview
  • CVE ID
  • CVE-2023-22400
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-13T00:15:10
  • Last Modified Date
  • 2023-01-24T19:03:13
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* 1 OR
References
Reference URL Reference Tags
https://kb.juniper.net/JSA70196
History
Created Old Value New Value Data Type Notes
2023-01-13 00:20:41 Added to TrackCVE
2023-01-13 00:20:42 Weakness Enumeration new
2023-01-13 05:15:11 2023-01-13T05:12:35 CVE Modified Date updated
2023-01-13 05:15:11 Received Awaiting Analysis Vulnerability Status updated
2023-01-19 16:15:18 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-24 19:14:07 2023-01-24T19:03:13 CVE Modified Date updated
2023-01-24 19:14:07 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-24 19:14:10 CPE Information updated