CVE-2023-28974
CVSS V2 None
CVSS V3 None
Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the bbe-smgd of Juniper Networks Junos OS allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). In a Broadband Edge / Subscriber Management scenario on MX Series when a specifically malformed ICMP packet addressed to the device is received from a subscriber the bbe-smgd will crash, affecting the subscriber sessions that are connecting, updating, or terminating. Continued receipt of such packets will lead to a sustained DoS condition. When this issue happens the below log can be seen if the traceoptions for the processes smg-service are enabled: BBE_TRACE(TRACE_LEVEL_INFO, "%s: Dropped unsupported ICMP PKT ... This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R1-S2, 22.3R2.
Overview
- CVE ID
- CVE-2023-28974
- Assigner
- sirt@juniper.net
- Vulnerability Status
- Undergoing Analysis
- Published Version
- 2023-04-17T22:15:09
- Last Modified Date
- 2023-04-18T03:15:28
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://supportportal.juniper.net/JSA70599 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28974 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28974 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-18 00:01:07 | Added to TrackCVE | |||
2023-04-18 00:01:09 | Weakness Enumeration | new | ||
2023-04-18 04:01:01 | 2023-04-18T03:15:28 | CVE Modified Date | updated | |
2023-04-18 04:01:01 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-04-25 11:00:51 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |