CVE-2023-44181

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Oct 13, 2023
Updated: Oct 20, 2023
CWE ID 835

Summary

CVE-2023-44181 is an improperly implemented security check vulnerability that affects Juniper Networks Junos OS QFX5k devices. This vulnerability allows packets to be punted to ARP queue, causing a layer 2 loop and resulting in DDOS violations and DDOS syslog. It is triggered when Storm control is enabled and ICMPv6 packets are present on the device. The vulnerability affects multiple versions of Junos OS prior to 22.2R2 on QFX5k devices. To remediate this vulnerability, users should upgrade to the appropriate patched version of Junos OS. The potential danger of this vulnerability is high, with a base severity rating of 7.5 out of 10 and a high availability impact.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-44181 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions