An Improper Input Validation vulnerability in Juniper Networks Junos OS allows unauthenticated attackers to cause a memory leak, leading to Denial of Service (DoS) conditions on QFX5000 Series platforms.
An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS has been identified as CVE-2023-44192. This vulnerability allows an unauthenticated attacker to cause a memory leak, resulting in Denial of Service (DoS) conditions on affected systems.
Understanding CVE-2023-44192
This section provides an overview of the vulnerability, its impact, technical details, and mitigation steps.
What is CVE-2023-44192?
CVE-2023-44192 is an Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS. It allows an unauthenticated, network-based attacker to trigger a memory leak, leading to Denial of Service (DoS) conditions.
The Impact of CVE-2023-44192
The vulnerability affects Juniper Networks Junos OS QFX5000 Series platforms. When specific DHCP packets are transmitted under an EVPN-VXLAN scenario, a memory leak occurs, reaching 99%. This can cause protocols to stop working, impacting network traffic. A manual system reboot is required to recover from the memory leak.
Technical Details of CVE-2023-44192
The vulnerability arises when shared tunnels are configured under the EVPN-VXLAN scenario on QFX5000 Series platforms.
Vulnerability Description
The Packet Forwarding Engine of Juniper Networks Junos OS is susceptible to the memory leak caused by the improper handling of specific DHCP packets under pseudo-VTEP configuration. Monitoring logs for specific error messages can help confirm the memory leak.
Affected Systems and Versions
Juniper Networks Junos OS QFX5000 Series platforms are affected by this vulnerability across multiple versions as specified in the configurations.
Exploitation Mechanism
Juniper SIRT has not detected any instances of malicious exploitation of this vulnerability.
Mitigation and Prevention
To address CVE-2023-44192, immediate steps should be taken to mitigate the risk and prevent potential attacks.
Immediate Steps to Take
There are no known workarounds for this issue. It is recommended to apply the provided software updates to resolve the vulnerability.
Long-Term Security Practices
Implementing regular software updates, monitoring for unusual network activity, and maintaining up-to-date security protocols can help enhance the overall security posture.
Patching and Updates
Juniper Networks has released updated software versions to address CVE-2023-44192. Users are advised to upgrade to the following releases or later: Junos OS 20.4R3-S6, 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2, 23.2R1, and subsequent versions.