Vulnerability Details : CVE-2023-22391
A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K Series devices allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Specific packets are being incorrectly routed to a queue used for other high-priority traffic such as BGP, PIM, ICMP, ICMPV6 ND and ISAKMP. Due to this misclassification of traffic, receipt of a high rate of these specific packets will cause delays in the processing of other traffic, leading to a Denial of Service (DoS). Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on ACX2K Series: All versions prior to 19.4R3-S9; All 20.2 versions; 20.3 versions prior to 20.3R3-S6 on ACX2K Series; 20.4 versions prior to 20.4R3-S4 on ACX2K Series; All 21.1 versions; 21.2 versions prior to 21.2R3-S3 on ACX2K Series. Note: This issues affects legacy ACX2K Series PPC-based devices. This platform reached Last Supported Version (LSV) as of the Junos OS 21.2 Release.
Vulnerability category: Denial of service
Products affected by CVE-2023-22391
- cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22391
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22391
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2023-22391
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
References for CVE-2023-22391
-
https://kb.juniper.net/JSA70187
2023-01 Security Bulletin: Junos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS) (CVE-2023-22391)Vendor Advisory
Jump to