![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
![](https://www.rewterz.com/wp-content/uploads/2023/10/1694503365773.jpeg)
Successful Completion of HBL MfB Annual VAPT program and Source Code Review Project
August 31, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – Multiple IBM Security Verify Information Queue Vulnerabilities
September 1, 2023![](https://www.rewterz.com/wp-content/uploads/2023/10/1694503365773.jpeg)
Successful Completion of HBL MfB Annual VAPT program and Source Code Review Project
August 31, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – Multiple IBM Security Verify Information Queue Vulnerabilities
September 1, 2023Severity
High
Analysis Summary
CVE-2023-4481
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by improper input validation vulnerability in the Routing Protocol Daemon (rpd). By sending a specially crafted BGP UPDATE message, a remote attacker could exploit this vulnerability to cause a denial of service.
Impact
- Denial of Service
Indicators Of Compromise
CVE
- CVE-2023-4481
Affected Vendors
Juniper
Affected Products
- Juniper Networks Junos OS
- Juniper Networks Junos OS Evolved
Remediation
Refer to Juniper Networks Security Bulletin for patch, upgrade or suggested workaround information.