First published: Wed Oct 11 2023(Updated: )
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device. This issue affects Juniper Networks Junos OS Evolved on PTX10003 Series: * All versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S3-EVO; * 22.2 version 22.2R1-EVO and later versions; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <21.4 | |
Juniper Networks Junos OS | =21.4 | |
Juniper Networks Junos OS | =21.4-r1 | |
Juniper Networks Junos OS | =21.4-r1-s1 | |
Juniper Networks Junos OS | =21.4-r1-s2 | |
Juniper Networks Junos OS | =21.4-r2 | |
Juniper Networks Junos OS | =21.4-r2-s1 | |
Juniper Networks Junos OS | =21.4-r2-s2 | |
Juniper Networks Junos OS | =21.4-r3 | |
Juniper Networks Junos OS | =21.4-r3-s1 | |
Juniper Networks Junos OS | =21.4-r3-s2 | |
Juniper Networks Junos OS | =21.4-r3-s3 | |
Juniper Networks Junos OS | =22.1-r1 | |
Juniper Networks Junos OS | =22.1-r1-s1 | |
Juniper Networks Junos OS | =22.1-r1-s2 | |
Juniper Networks Junos OS | =22.1-r2 | |
Juniper Networks Junos OS | =22.1-r2-s1 | |
Juniper Networks Junos OS | =22.1-r3 | |
Juniper Networks Junos OS | =22.1-r3-s1 | |
Juniper Networks Junos OS | =22.1-r3-s2 | |
Juniper Networks Junos OS | =22.2-r1 | |
Juniper Networks Junos OS | =22.2-r1-s1 | |
Juniper Networks Junos OS | =22.2-r2 | |
Juniper Networks Junos OS | =22.2-r2-s1 | |
Juniper Networks Junos OS | =22.2-r2-s2 | |
Juniper Networks Junos OS | =22.2-r3 | |
Juniper Networks Junos OS | =22.2-r3-s1 | |
Juniper Networks Junos OS | =22.3-r1 | |
Juniper Networks Junos OS | =22.3-r1-s1 | |
Juniper Networks Junos OS | =22.3-r1-s2 | |
Juniper Networks Junos OS | =22.3-r2 | |
Juniper Networks Junos OS | =22.3-r2-s1 | |
Juniper Networks Junos OS | =22.4-r1 | |
Juniper Networks Junos OS | =22.4-r1-s1 | |
Juniper Networks Junos OS | =22.4-r1-s2 | |
Juniper Networks Junos OS | =22.4-r2 | |
Juniper Networks Junos OS | =23.2-r1 | |
Juniper Networks Junos OS | =23.2-r1-s1 | |
juniper ptx10003 | ||
juniper ptx10003 160c | ||
juniper ptx10003 80c | ||
juniper ptx10003 81cd |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.4R2-S1-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.3R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-44189.
The affected software is Juniper Junos Os Evolved versions up to and including 21.4.
The severity of CVE-2023-44189 is medium with a CVSS score of 5.4.
CVE-2023-44189 allows a network-adjacent attacker to bypass MAC address checking and forward MAC addresses not intended to reach the adjacent LAN to the downstream network.
No, the Juniper Ptx10003 series is not affected by CVE-2023-44189.