First published: Wed Oct 11 2023(Updated: )
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device. This issue affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016: * All versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions 22.2R1-EVO and later; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO.
Credit: sirt@juniper.net sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Os Evolved | <21.4 | |
Juniper Junos Os Evolved | =21.4 | |
Juniper Junos Os Evolved | =21.4-r1 | |
Juniper Junos Os Evolved | =21.4-r1-s1 | |
Juniper Junos Os Evolved | =21.4-r1-s2 | |
Juniper Junos Os Evolved | =21.4-r2 | |
Juniper Junos Os Evolved | =21.4-r2-s1 | |
Juniper Junos Os Evolved | =21.4-r2-s2 | |
Juniper Junos Os Evolved | =21.4-r3 | |
Juniper Junos Os Evolved | =21.4-r3-s1 | |
Juniper Junos Os Evolved | =21.4-r3-s2 | |
Juniper Junos Os Evolved | =21.4-r3-s3 | |
Juniper Junos Os Evolved | =21.4-r3-s4 | |
Juniper Junos Os Evolved | =22.1-r1 | |
Juniper Junos Os Evolved | =22.1-r1-s1 | |
Juniper Junos Os Evolved | =22.1-r1-s2 | |
Juniper Junos Os Evolved | =22.1-r2 | |
Juniper Junos Os Evolved | =22.1-r2-s1 | |
Juniper Junos Os Evolved | =22.1-r3 | |
Juniper Junos Os Evolved | =22.1-r3-s1 | |
Juniper Junos Os Evolved | =22.1-r3-s2 | |
Juniper Junos Os Evolved | =22.1-r3-s3 | |
Juniper Junos Os Evolved | =22.2-r1 | |
Juniper Junos Os Evolved | =22.2-r1-s1 | |
Juniper Junos Os Evolved | =22.2-r2 | |
Juniper Junos Os Evolved | =22.2-r2-s1 | |
Juniper Junos Os Evolved | =22.2-r2-s2 | |
Juniper Junos Os Evolved | =22.2-r3 | |
Juniper Junos Os Evolved | =22.2-r3-s1 | |
Juniper Junos Os Evolved | =22.3-r1 | |
Juniper Junos Os Evolved | =22.3-r1-s1 | |
Juniper Junos Os Evolved | =22.3-r1-s2 | |
Juniper Junos Os Evolved | =22.3-r2 | |
Juniper Junos Os Evolved | =22.3-r2-s1 | |
Juniper Junos Os Evolved | =22.4-r1 | |
Juniper Junos Os Evolved | =22.4-r1-s1 | |
Juniper Junos Os Evolved | =22.4-r1-s2 | |
Juniper Junos Os Evolved | =22.4-r2 | |
Juniper Junos Os Evolved | =23.2-r1 | |
Juniper Ptx10001 | ||
Juniper Ptx10001-36mr | ||
Juniper Ptx10004 | ||
Juniper Ptx10008 | ||
Juniper Ptx10016 |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.4R2-S1-EVO, 22.4R3-EVO, 23.2R1-S1-EVO, 23.2R2-EVO, 23.3R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-44190.
This vulnerability affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices.
The severity of CVE-2023-44190 is medium.
A network-adjacent attacker can exploit this vulnerability by bypassing MAC address checking and forwarding MAC addresses not intended to reach the adjacent LAN.
Yes, Juniper Networks has released a fix for CVE-2023-44190. Please refer to the official Juniper Networks support portal for more information.