Executive Summary

Informations
Name CVE-2023-22409 First vendor Publication 2023-01-13
Vendor Cve Last vendor Modification 2023-01-24

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22409

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Hardware 1
Os 1003

Sources (Detail)

Source Url
CONFIRM https://kb.juniper.net/JSA70205

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Date Informations
2024-08-02 13:45:17
  • Multiple Updates
2024-08-02 01:32:09
  • Multiple Updates
2024-02-02 02:42:37
  • Multiple Updates
2024-02-01 12:29:15
  • Multiple Updates
2023-10-21 02:27:54
  • Multiple Updates
2023-09-05 13:38:19
  • Multiple Updates
2023-09-05 01:28:31
  • Multiple Updates
2023-09-02 13:36:11
  • Multiple Updates
2023-09-02 01:28:58
  • Multiple Updates
2023-08-12 13:42:04
  • Multiple Updates
2023-08-12 01:28:14
  • Multiple Updates
2023-08-11 13:33:08
  • Multiple Updates
2023-08-11 01:29:05
  • Multiple Updates
2023-08-06 13:30:32
  • Multiple Updates
2023-08-06 01:27:52
  • Multiple Updates
2023-08-04 13:31:02
  • Multiple Updates
2023-08-04 01:28:15
  • Multiple Updates
2023-07-28 02:19:32
  • Multiple Updates
2023-07-14 13:30:52
  • Multiple Updates
2023-07-14 01:27:53
  • Multiple Updates
2023-04-28 02:17:05
  • Multiple Updates
2023-03-29 02:29:51
  • Multiple Updates
2023-03-28 12:27:43
  • Multiple Updates
2023-01-24 21:27:18
  • Multiple Updates
2023-01-13 09:27:16
  • Multiple Updates
2023-01-13 05:27:16
  • First insertion