Learn about CVE-2023-44191, a Denial of Service vulnerability in Juniper Networks Junos OS, impacting QFX5000 Series and EX4000 Series platforms through PFE hogging and DHCP packets.
A Denial of Service vulnerability in Juniper Networks Junos OS allows attackers to cause service disruption on QFX5000 Series and EX4000 Series platforms by triggering PFE hogging through DHCP packets.
Understanding CVE-2023-44191
This vulnerability, classified as CWE-770 Allocation of Resources Without Limits or Throttling, affects Junos OS versions 21.1 and later, excluding specific patched versions.
What is CVE-2023-44191?
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS) on QFX5000 Series and EX4000 Series platforms.
The Impact of CVE-2023-44191
Exploiting this vulnerability can lead to PFE hogging and dropping of socket connections on the affected platforms, causing service disruption.
Technical Details of CVE-2023-44191
Vulnerability Description
When a high number of VLANs are configured on Juniper Networks Junos OS, a specific DHCP packet can trigger PFE hogging, resulting in service disruption.
Affected Systems and Versions
Junos OS versions 21.1 and later, up to specific versions, on QFX5000 Series and EX4000 Series platforms are vulnerable.
Exploitation Mechanism
No malicious exploitation of this vulnerability has been reported by Juniper SIRT.
Mitigation and Prevention
Immediate Steps to Take
Update affected systems to the patched versions released by Juniper Networks to mitigate this vulnerability.
Long-Term Security Practices
Regularly update and patch Junos OS to prevent security vulnerabilities and ensure system integrity.
Patching and Updates
Refer to Juniper's advisory (JSA73155) for detailed information and download the updated software releases to resolve CVE-2023-44191.