CVE-2023-22401

CVSS V2 None CVSS V3 None
Description
An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On the PTX10008 and PTX10016 platforms running Junos OS or Junos OS Evolved, when a specific SNMP MIB is queried this will cause a PFE crash and the FPC will go offline and not automatically recover. A system restart is required to get the affected FPC in an operational state again. This issue affects: Juniper Networks Junos OS 22.1 version 22.1R2 and later versions; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. Juniper Networks Junos OS Evolved 21.3-EVO version 21.3R3-EVO and later versions; 21.4-EVO version 21.4R1-S2-EVO, 21.4R2-EVO and later versions prior to 21.4R2-S1-EVO; 22.1-EVO version 22.1R2-EVO and later versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.
Overview
  • CVE ID
  • CVE-2023-22401
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-13T00:15:10
  • Last Modified Date
  • 2023-01-24T17:29:21
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:* 1 OR
References
Reference URL Reference Tags
https://kb.juniper.net/JSA70197
History
Created Old Value New Value Data Type Notes
2023-01-13 00:20:43 Added to TrackCVE
2023-01-13 00:20:45 Weakness Enumeration new
2023-01-13 05:15:11 2023-01-13T05:12:35 CVE Modified Date updated
2023-01-13 05:15:11 Received Awaiting Analysis Vulnerability Status updated
2023-01-19 16:15:18 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-24 18:12:40 2023-01-24T17:29:21 CVE Modified Date updated
2023-01-24 18:12:40 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-24 18:12:42 CPE Information updated