First published: Thu Oct 12 2023(Updated: )
An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system. When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. This issue is a prerequisite for CVE-2023-44195. This issue affects Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S8-EVO; * 21.1-EVO version 21.1R1-EVO and later; * 21.2-EVO versions prior to 21.2R3-S6-EVO; * 21.3-EVO version 21.3R1-EVO and later; * 21.4-EVO versions prior to 21.4R3-S3-EVO; * 22.1-EVO versions prior to 22.1R3-S4-EVO; * 22.2-EVO versions prior to 22.2R3-S3-EVO; * 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO; * 22.4-EVO versions prior to 22.4R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <20.4 | |
Juniper Networks Junos OS | =20.4-r1 | |
Juniper Networks Junos OS | =20.4-r1-s1 | |
Juniper Networks Junos OS | =20.4-r1-s2 | |
Juniper Networks Junos OS | =20.4-r2 | |
Juniper Networks Junos OS | =20.4-r2-s1 | |
Juniper Networks Junos OS | =20.4-r2-s2 | |
Juniper Networks Junos OS | =20.4-r2-s3 | |
Juniper Networks Junos OS | =20.4-r3 | |
Juniper Networks Junos OS | =20.4-r3-s1 | |
Juniper Networks Junos OS | =20.4-r3-s2 | |
Juniper Networks Junos OS | =20.4-r3-s3 | |
Juniper Networks Junos OS | =20.4-r3-s4 | |
Juniper Networks Junos OS | =20.4-r3-s5 | |
Juniper Networks Junos OS | =20.4-r3-s6 | |
Juniper Networks Junos OS | =20.4-r3-s7 | |
Juniper Networks Junos OS | =21.1-r1 | |
Juniper Networks Junos OS | =21.1-r1-s1 | |
Juniper Networks Junos OS | =21.1-r2 | |
Juniper Networks Junos OS | =21.1-r3 | |
Juniper Networks Junos OS | =21.1-r3-s1 | |
Juniper Networks Junos OS | =21.1-r3-s2 | |
Juniper Networks Junos OS | =21.1-r3-s3 | |
Juniper Networks Junos OS | =21.2 | |
Juniper Networks Junos OS | =21.2-r1 | |
Juniper Networks Junos OS | =21.2-r1-s1 | |
Juniper Networks Junos OS | =21.2-r1-s2 | |
Juniper Networks Junos OS | =21.2-r2 | |
Juniper Networks Junos OS | =21.2-r2-s1 | |
Juniper Networks Junos OS | =21.2-r2-s2 | |
Juniper Networks Junos OS | =21.2-r3 | |
Juniper Networks Junos OS | =21.2-r3-s1 | |
Juniper Networks Junos OS | =21.2-r3-s2 | |
Juniper Networks Junos OS | =21.2-r3-s3 | |
Juniper Networks Junos OS | =21.2-r3-s4 | |
Juniper Networks Junos OS | =21.2-r3-s5 | |
Juniper Networks Junos OS | =21.3-r1 | |
Juniper Networks Junos OS | =21.3-r1-s1 | |
Juniper Networks Junos OS | =21.3-r2 | |
Juniper Networks Junos OS | =21.3-r2-s1 | |
Juniper Networks Junos OS | =21.3-r2-s2 | |
Juniper Networks Junos OS | =21.3-r3 | |
Juniper Networks Junos OS | =21.3-r3-s1 | |
Juniper Networks Junos OS | =21.3-r3-s2 | |
Juniper Networks Junos OS | =21.3-r3-s3 | |
Juniper Networks Junos OS | =21.3-r3-s4 | |
Juniper Networks Junos OS | =21.4 | |
Juniper Networks Junos OS | =21.4-r1 | |
Juniper Networks Junos OS | =21.4-r1-s1 | |
Juniper Networks Junos OS | =21.4-r1-s2 | |
Juniper Networks Junos OS | =21.4-r2 | |
Juniper Networks Junos OS | =21.4-r2-s1 | |
Juniper Networks Junos OS | =21.4-r2-s2 | |
Juniper Networks Junos OS | =21.4-r3 | |
Juniper Networks Junos OS | =21.4-r3-s1 | |
Juniper Networks Junos OS | =21.4-r3-s2 | |
Juniper Networks Junos OS | =21.4-r3-s3 | |
Juniper Networks Junos OS | =22.1-r1 | |
Juniper Networks Junos OS | =22.1-r1-s1 | |
Juniper Networks Junos OS | =22.1-r1-s2 | |
Juniper Networks Junos OS | =22.1-r2 | |
Juniper Networks Junos OS | =22.1-r2-s1 | |
Juniper Networks Junos OS | =22.1-r3 | |
Juniper Networks Junos OS | =22.1-r3-s1 | |
Juniper Networks Junos OS | =22.1-r3-s2 | |
Juniper Networks Junos OS | =22.1-r3-s3 | |
Juniper Networks Junos OS | =22.2-r1 | |
Juniper Networks Junos OS | =22.2-r1-s1 | |
Juniper Networks Junos OS | =22.2-r2 | |
Juniper Networks Junos OS | =22.2-r2-s1 | |
Juniper Networks Junos OS | =22.2-r2-s2 | |
Juniper Networks Junos OS | =22.3-r1 | |
Juniper Networks Junos OS | =22.3-r1-s1 | |
Juniper Networks Junos OS | =22.3-r1-s2 | |
Juniper Networks Junos OS | =22.3-r2 | |
Juniper Networks Junos OS | =22.3-r2-s1 | |
Juniper Networks Junos OS | =22.4-r1 | |
Juniper Networks Junos OS | =22.4-r1-s1 | |
Juniper Networks Junos OS | =22.4-r1-s2 | |
juniper ptx10003 |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.4R3-S3-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R2-S2-EVO, 22.3R3-EVO, 22.4R2-EVO, 23.2R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44196 is classified as a critical vulnerability.
To fix CVE-2023-44196, update to the latest version of Junos OS Evolved that addresses this vulnerability.
CVE-2023-44196 affects devices running specific versions of Juniper Networks Junos OS Evolved, especially on PTX10003 Series.
CVE-2023-44196 allows an unauthenticated adjacent attacker to potentially compromise the integrity of the system.
CVE-2023-44196 affects multiple versions of Junos OS Evolved including 20.4, 21.1, 21.2, and 21.3.