First published: Mon Apr 17 2023(Updated: )
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an attribute of an active BGP route is updated memory will leak. As rpd memory usage increases over time the rpd process will eventually run out of memory, crash, and restart. The memory utilization can be monitored with the following CLI commands: show task memory show system processes extensive | match rpd This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =20.3 | |
Juniper JUNOS | =20.3-r1 | |
Juniper JUNOS | =20.3-r1-s1 | |
Juniper JUNOS | =20.3-r1-s2 | |
Juniper JUNOS | =20.3-r2 | |
Juniper JUNOS | =20.3-r2-s1 | |
Juniper JUNOS | =20.3-r3 | |
Juniper JUNOS | =20.3-r3-s1 | |
Juniper JUNOS | =20.4 | |
Juniper JUNOS | =20.4-r1 | |
Juniper JUNOS | =20.4-r1-s1 | |
Juniper JUNOS | =20.4-r2 | |
Juniper JUNOS | =20.4-r2-s1 | |
Juniper JUNOS | =20.4-r2-s2 | |
Juniper JUNOS | =20.4-r3 | |
Juniper JUNOS | =20.4-r3-s1 | |
Juniper JUNOS | =20.4-r3-s2 | |
Juniper JUNOS | =20.4-r3-s3 | |
Juniper JUNOS | =20.4-r3-s4 | |
Juniper JUNOS | =20.4-r3-s5 | |
Juniper JUNOS | =21.1 | |
Juniper JUNOS | =21.1-r1 | |
Juniper JUNOS | =21.1-r1-s1 | |
Juniper JUNOS | =21.1-r2 | |
Juniper JUNOS | =21.1-r2-s1 | |
Juniper JUNOS | =21.1-r2-s2 | |
Juniper JUNOS | =21.2 | |
Juniper JUNOS | =21.2-r1 | |
Juniper JUNOS | =21.2-r1-s1 | |
Juniper JUNOS | =21.2-r1-s2 | |
Juniper JUNOS | =21.2-r2 | |
Juniper JUNOS | =21.2-r2-s1 | |
Juniper JUNOS | =21.2-r2-s2 | |
Juniper JUNOS | =21.3 | |
Juniper JUNOS | =21.3-r1 | |
Juniper JUNOS | =21.3-r1-s1 | |
Juniper JUNOS | =21.3-r1-s2 | |
Juniper Networks Junos OS Evolved | =20.3-r1 | |
Juniper Networks Junos OS Evolved | =20.3-r1-s1 | |
Juniper Networks Junos OS Evolved | =20.3-r1-s2 | |
Juniper Networks Junos OS Evolved | =20.3-r1-s3 | |
Juniper Networks Junos OS Evolved | =20.3-r2 | |
Juniper Networks Junos OS Evolved | =20.4 | |
Juniper Networks Junos OS Evolved | =20.4-r1 | |
Juniper Networks Junos OS Evolved | =20.4-r1-s1 | |
Juniper Networks Junos OS Evolved | =20.4-r1-s2 | |
Juniper Networks Junos OS Evolved | =20.4-r2 | |
Juniper Networks Junos OS Evolved | =20.4-r2-s1 | |
Juniper Networks Junos OS Evolved | =20.4-r2-s2 | |
Juniper Networks Junos OS Evolved | =20.4-r2-s3 | |
Juniper Networks Junos OS Evolved | =20.4-r3 | |
Juniper Networks Junos OS Evolved | =20.4-r3-s1 | |
Juniper Networks Junos OS Evolved | =20.4-r3-s2 | |
Juniper Networks Junos OS Evolved | =20.4-r3-s3 | |
Juniper Networks Junos OS Evolved | =20.4-r3-s4 | |
Juniper Networks Junos OS Evolved | =20.4-r3-s5 | |
Juniper Networks Junos OS Evolved | =21.2 | |
Juniper Networks Junos OS Evolved | =21.2-r1 | |
Juniper Networks Junos OS Evolved | =21.2-r1-s1 | |
Juniper Networks Junos OS Evolved | =21.2-r1-s2 | |
Juniper Networks Junos OS Evolved | =21.2-r2 | |
Juniper Networks Junos OS Evolved | =21.2-r2-s1 | |
Juniper Networks Junos OS Evolved | =21.2-r2-s2 | |
Juniper Networks Junos OS Evolved | =21.3 | |
Juniper Networks Junos OS Evolved | =21.3-r1 | |
Juniper Networks Junos OS Evolved | =21.3-r1-s1 |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R3-S6-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases. Junos OS: 20.3R3-S2, 20.4R3-S6, 21.1R3, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28982 is classified as a high-severity vulnerability due to its potential to cause Denial of Service (DoS).
To resolve CVE-2023-28982, users should upgrade to the latest patched version of Junos OS as recommended by Juniper Networks.
CVE-2023-28982 is caused by a missing release of memory after the effective lifetime in the routing protocol daemon.
CVE-2023-28982 affects multiple versions of Juniper Networks' Junos OS, including 20.3, 20.4, 21.1, 21.2, and 21.3.
CVE-2023-28982 can be exploited by unauthenticated, network-based attackers.