CWE
1250
Advisory Published
Updated

CVE-2023-22405: Junos OS: QFX5k Series, EX46xx Series: MAC limiting feature stops working after PFE restart or device reboot

First published: Thu Jan 12 2023(Updated: )

An Improper Preservation of Consistency Between Independent Representations of Shared State vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS) to device due to out of resources. When a device is configured with "service-provider/SP style" switching, and mac-limiting is configured on an Aggregated Ethernet (ae) interface, and then a PFE is restarted or the device is rebooted, mac-limiting doesn't work anymore. Please note that the issue might not be apparent as traffic will continue to flow through the device although the mac table and respective logs will indicate that mac limit is reached. Functionality can be restored by removing and re-adding the MAC limit configuration. This issue affects Juniper Networks Junos OS on QFX5k Series, EX46xx Series: All versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3 on; 21.4 versions prior to 21.4R3 on; 22.1 versions prior to 22.1R2 on.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Junos<20.2
Juniper Junos=20.2
Juniper Junos=20.2-r1
Juniper Junos=20.2-r1-s1
Juniper Junos=20.2-r1-s2
Juniper Junos=20.2-r1-s3
Juniper Junos=20.2-r2
Juniper Junos=20.2-r2-s1
Juniper Junos=20.2-r2-s2
Juniper Junos=20.2-r2-s3
Juniper Junos=20.2-r3
Juniper Junos=20.2-r3-s1
Juniper Junos=20.2-r3-s2
Juniper Junos=20.2-r3-s3
Juniper Junos=20.2-r3-s4
Juniper Junos=20.3
Juniper Junos=20.3-r1
Juniper Junos=20.3-r1-s1
Juniper Junos=20.3-r1-s2
Juniper Junos=20.3-r2
Juniper Junos=20.3-r2-s1
Juniper Junos=20.3-r3
Juniper Junos=20.3-r3-s1
Juniper Junos=20.3-r3-s2
Juniper Junos=20.3-r3-s3
Juniper Junos=20.3-r3-s4
Juniper Junos=20.4
Juniper Junos=20.4-r1
Juniper Junos=20.4-r1-s1
Juniper Junos=20.4-r2
Juniper Junos=20.4-r2-s1
Juniper Junos=20.4-r2-s2
Juniper Junos=20.4-r3
Juniper Junos=20.4-r3-s1
Juniper Junos=20.4-r3-s2
Juniper Junos=20.4-r3-s3
Juniper Junos=21.1
Juniper Junos=21.1-r1
Juniper Junos=21.1-r1-s1
Juniper Junos=21.1-r2
Juniper Junos=21.1-r2-s1
Juniper Junos=21.1-r2-s2
Juniper Junos=21.1-r3
Juniper Junos=21.1-r3-s1
Juniper Junos=21.1-r3-s2
Juniper Junos=21.2
Juniper Junos=21.2-r1
Juniper Junos=21.2-r1-s1
Juniper Junos=21.2-r1-s2
Juniper Junos=21.2-r2
Juniper Junos=21.2-r2-s1
Juniper Junos=21.2-r2-s2
Juniper Junos=21.2-r3
Juniper Junos=21.3
Juniper Junos=21.3-r1
Juniper Junos=21.3-r1-s1
Juniper Junos=21.3-r1-s2
Juniper Junos=21.3-r2
Juniper Junos=21.3-r2-s1
Juniper Junos=21.3-r2-s2
Juniper Junos=21.4
Juniper Junos=21.4-r1
Juniper Junos=21.4-r1-s1
Juniper Junos=21.4-r1-s2
Juniper Junos=21.4-r2
Juniper Junos=22.1-r1
Juniper Junos=22.1-r1-s1
Juniper EX4600
Juniper EX4600
Juniper EX4650
Juniper QFX5100
Juniper QFX5100
Juniper QFX5110
Juniper QFX5120
Juniper QFX5130
Juniper QFX5200-48Y
Juniper QFX5200-32C
Juniper QFX5200-48Y
Juniper QFX5210-64C
Juniper QFX5210-64C
Juniper QFX5220

Remedy

The following software releases have been updated to resolve this specific issue: 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S1, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-22405?

    CVE-2023-22405 has a high severity rating due to its potential to cause a Denial of Service (DoS) on affected devices.

  • How do I fix CVE-2023-22405?

    To mitigate CVE-2023-22405, it is advised to upgrade to the latest version of Junos OS that addresses this vulnerability.

  • Which versions of Junos OS are affected by CVE-2023-22405?

    CVE-2023-22405 affects Junos OS versions up to 20.2, including various release updates.

  • What type of vulnerability is CVE-2023-22405?

    CVE-2023-22405 is categorized as an Improper Preservation of Consistency Between Independent Representations of Shared State vulnerability.

  • Can an unauthenticated attacker exploit CVE-2023-22405?

    Yes, CVE-2023-22405 can be exploited by an adjacent, unauthenticated attacker, allowing them to cause a DoS.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203