Vulnerability Details : CVE-2023-22410
Potential exploit
A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Networks Junos OS on MX Series platforms with MPC10/MPC11 line cards, allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). Devices are only vulnerable when the Suspicious Control Flow Detection (scfd) feature is enabled. Upon enabling this specific feature, an attacker sending specific traffic is causing memory to be allocated dynamically and it is not freed. Memory is not freed even after deactivating this feature. Sustained processing of such traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. The FPC memory usage can be monitored using the CLI command "show chassis fpc". On running the above command, the memory of AftDdosScfdFlow can be observed to detect the memory leak. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 20.2R3-S5; 20.3 version 20.3R1 and later versions.
Vulnerability category: Denial of service
Products affected by CVE-2023-22410
- cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22410
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22410
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2023-22410
-
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
References for CVE-2023-22410
-
https://kb.juniper.net/JSA70206
2023-01 Security Bulletin: Junos OS: MX Series with MPC10/MPC11: When Suspicious Control Flow Detection (scfd) is enabled and an attacker is sending specific traffic, this causes a memory leak. (CVE-2Exploit;Vendor Advisory
Jump to