Skip to content

A Reachable Assertion vulnerability in the routing...

High severity Unreviewed Published Oct 13, 2023 to the GitHub Advisory Database • Updated Apr 4, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS).

Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

Note: This issue is not noticed when all the devices in the network are Juniper devices.

This issue affects Juniper Networks:

Junos OS:

  • All versions prior to 20.4R3-S7;
  • 21.2 versions prior to 21.2R3-S5;
  • 21.3 versions prior to 21.3R3-S4;
  • 21.4 versions prior to 21.4R3-S4;
  • 22.1 versions prior to 22.1R3-S4;
  • 22.2 versions prior to 22.2R3;
  • 22.3 versions prior to 22.3R3;
  • 22.4 versions prior to 22.4R3.

Junos OS Evolved:

  • All versions prior to 22.3R3-EVO;
  • 22.4-EVO versions prior to 22.4R3-EVO;
  • 23.2-EVO versions prior to 23.2R1-EVO.

References

Published by the National Vulnerability Database Oct 12, 2023
Published to the GitHub Advisory Database Oct 13, 2023
Last updated Apr 4, 2024

Severity

High

EPSS score

0.078%
(35th percentile)

Weaknesses

CVE ID

CVE-2023-44175

GHSA ID

GHSA-r6wp-r547-f9gf

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.