CVE-2023-36832
CVSS 3.1 Score 7.5 of 10 (high)
Details
Summary
CVE-2023-36832 is an Improper Handling of Exceptional Conditions vulnerability affecting Juniper Networks Junos OS on MX Series. This issue allows unauthenticated attackers to send specific packets to an Aggregated Multiservices (AMS) interface, causing the packet forwarding engine (PFE) to crash and resulting in a Denial of Service (DoS). The vulnerability is only triggered by packets destined to a local-interface via a service-interface (AMS), and only affects specific Junos OS versions on MS-MPC, MS-MIC, and MX-SPC3 cards. Continued receipt and processing of these malicious packets will create a sustained DoS condition. Versions of Junos OS affected include all prior to 19.1R3-S10, 19.2 versions prior to 19.2R3-S7, 19.3 versions prior to 19.3R3-S8, 19.4 versions prior to 19.4R3-S12, 20.2 versions prior to 20.2R3-S8, 20.4 versions prior to 20.4R3-S7, 21.1 versions prior to 21.1R3-S5, 21.2 versions prior to 21.2R3-S5, 21.3 versions prior to 21.3R3-S4, 21.4 versions prior to 21.4R3-S3, 22.1 versions prior to 22.1R3-S2, 22.2 versions prior to 22.2R3, 22.3 versions prior to 22.3R2-S1 and 22.3R3, and 22.4 versions prior to 22.4R1-S2 and 22.4R2.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions