Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-22398 : Security Advisory and Response

A Denial of Service issue in Juniper Networks Junos OS Evolved allows a local attacker to crash the RPD with an MPLS ping on BGP LSPs. Learn more about CVE-2023-22398.

An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS) by crashing the RPD when an MPLS ping is performed on BGP LSPs.

Understanding CVE-2023-22398

This vulnerability impacts Juniper Networks Junos OS and Junos OS Evolved, potentially leading to a sustained Denial of Service (DoS) attack.

What is CVE-2023-22398?

CVE-2023-22398 is an Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. It allows a locally authenticated attacker with low privileges to crash the RPD by performing an MPLS ping on BGP LSPs.

The Impact of CVE-2023-22398

The exploitation of this vulnerability can result in a Denial of Service (DoS) condition, impacting the availability of affected systems.

Technical Details of CVE-2023-22398

The vulnerability description is an Access of Uninitialized Pointer in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. The affected systems include specific versions of Junos OS and Junos OS Evolved prior to the patched releases.

Vulnerability Description

The vulnerability allows a locally authenticated attacker to crash the RPD by performing an MPLS ping on BGP LSPs, leading to a Denial of Service (DoS).

Affected Systems and Versions

Juniper Networks Junos OS versions 15.1 to 21.1 and Junos OS Evolved versions prior to 20.4R3-S4 and 21.1 are affected by this vulnerability.

Exploitation Mechanism

The vulnerability can be exploited by a locally authenticated attacker with low privileges by performing an MPLS ping on BGP LSPs, causing the RPD to crash.

Mitigation and Prevention

It is crucial to take immediate action to mitigate the risks associated with CVE-2023-22398.

Immediate Steps to Take

As there are no known workarounds, it is recommended to limit access to trusted networks, hosts, and users using access lists or firewall filters to reduce the risk of exploitation.

Long-Term Security Practices

Implementing secure coding practices, regular security assessments, and staying updated with security advisories can help prevent similar vulnerabilities in the future.

Patching and Updates

Juniper Networks has released patched software versions to address this vulnerability. Users are advised to update their Junos OS and Junos OS Evolved to the respective patched releases to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now