CVE-2023-36832

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Jul 14, 2023
Updated: Jul 26, 2023
CWE ID 755

Summary

CVE-2023-36832 is an Improper Handling of Exceptional Conditions vulnerability affecting Juniper Networks Junos OS on MX Series. This issue allows unauthenticated attackers to send specific packets to an Aggregated Multiservices (AMS) interface, causing the packet forwarding engine (PFE) to crash and resulting in a Denial of Service (DoS). The vulnerability is only triggered by packets destined to a local-interface via a service-interface (AMS), and only affects specific Junos OS versions on MS-MPC, MS-MIC, and MX-SPC3 cards. Continued receipt and processing of these malicious packets will create a sustained DoS condition. Versions of Junos OS affected include all prior to 19.1R3-S10, 19.2 versions prior to 19.2R3-S7, 19.3 versions prior to 19.3R3-S8, 19.4 versions prior to 19.4R3-S12, 20.2 versions prior to 20.2R3-S8, 20.4 versions prior to 20.4R3-S7, 21.1 versions prior to 21.1R3-S5, 21.2 versions prior to 21.2R3-S5, 21.3 versions prior to 21.3R3-S4, 21.4 versions prior to 21.4R3-S3, 22.1 versions prior to 22.1R3-S2, 22.2 versions prior to 22.2R3, 22.3 versions prior to 22.3R2-S1 and 22.3R3, and 22.4 versions prior to 22.4R1-S2 and 22.4R2.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-36832 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions