Rewterz Threat Advisory – Multiple Apache Tomcat Vulnerabilities
October 12, 2023Rewterz Threat Advisory – Multiple SAP Products Vulnerabilities
October 12, 2023Rewterz Threat Advisory – Multiple Apache Tomcat Vulnerabilities
October 12, 2023Rewterz Threat Advisory – Multiple SAP Products Vulnerabilities
October 12, 2023Severity
Medium
Analysis Summary
CVE-2023-44184 CVSS:6.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by improper restriction of operations within the bounds of a memory buffer vulnerability in the management daemon (mgd) process. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44181 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improperly implemented security check for standard vulnerability in storm control. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44188 CVSS:5.3
Juniper Networks Junos OS is vulnerable to a denial of service, caused by a time-of-check time-of-use (TOCTOU) race condition vulnerability in telemetry processing. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44191 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by an allocation of resources without limits or throttling vulnerability. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-22392 CVSS:6.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by a missing release of memory after effective lifetime vulnerability in the Packet Forwarding Engine (PFE). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44192 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper input validation vulnerability in the Packet Forwarding Engine. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44175 CVSS:7.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by a reachable assertion vulnerability in the routing protocol daemon (rpd). By sending a specially crafted command, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44178 CVSS:5.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by a stack-based buffer overflow vulnerability in the CLI command. By sending a specially crafted command, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44177 CVSS:5.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by a stack-based buffer overflow vulnerability in the CLI command. By sending a specially crafted command, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44176 CVSS:5.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by a stack-based buffer overflow vulnerability in the CLI command. By sending a specially crafted command, a local authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44185 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper input validation vulnerability in the routing protocol daemon (rpd). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-36841 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper check for unusual or exceptional conditions vulnerability in the Packet Forwarding Engine (pfe). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-36843 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper handling of inconsistent special elements vulnerability in the Junos Services Framework (jsf) module. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44194 CVSS:8.4
Juniper Networks Junos OS could allow a local attacker to gain elevated privileges on the system, caused by incorrect default permissions vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to create a backdoor with root privileges.
CVE-2023-44193 CVSS:5.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper release of memory before removing last reference vulnerability in Packet Forwarding Engine (PFE). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-44183 CVSS:6.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper input validation vulnerability in the VxLAN packet forwarding engine (PFE). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
Impact
- Denial of Service
- Buffer Overflow
- Privilege Escalation
Indicators Of Compromise
CVE
- CVE-2023-44184
- CVE-2023-44181
- CVE-2023-44188
- CVE-2023-44191
- CVE-2023-22392
- CVE-2023-44192
- CVE-2023-44175
- CVE-2023-44178
- CVE-2023-44177
- CVE-2023-44176
- CVE-2023-44185
- CVE-2023-36841
- CVE-2023-36843
- CVE-2023-44194
- CVE-2023-44193
- CVE-2023-44183
Affected Vendors
Juniper
Affected Products
- Juniper Networks Junos OS
- Juniper Networks Junos OS Evolved
- Juniper Networks Junos OS 20.4
- Juniper Networks Junos OS 21.1
- Juniper Networks Junos OS 21.2
- Juniper Networks Junos OS 21.3
- Juniper Networks Junos OS 21.4
- Juniper Networks Junos OS 22.1
- Juniper Networks Junos OS 22.3
- Juniper Networks Junos OS 22.2
- Juniper Networks Junos OS 22.4
- Juniper Networks QFX5000 Series
- Juniper Networks Junos OS 23.1
- Juniper Networks Junos OS 23.2
- Juniper Networks QFX5K series platforms
- Juniper Networks MX Series
Remediation
Refer to Juniper Networks Security Bulletin for patch, upgrade or suggested workaround information.