CVE Vulnerabilities

CVE-2023-44190

Origin Validation Error

Published: Oct 11, 2023 | Modified: Oct 19, 2023
CVSS 3.x
5.4
MEDIUM
Source:
NVD
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device.

This issue affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016:

  • All versions prior to 21.4R3-S5-EVO;
  • 22.1 versions prior to 22.1R3-S4-EVO;
  • 22.2 versions 22.2R1-EVO and later;
  • 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
  • 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;
  • 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO.

Weakness

The product does not properly verify that the source of data or communication is valid.

Affected Software

Name Vendor Start Version End Version
Junos_os_evolved Juniper * 21.4 (excluding)
Junos_os_evolved Juniper 21.4 (including) 21.4 (including)
Junos_os_evolved Juniper 21.4-r1 (including) 21.4-r1 (including)
Junos_os_evolved Juniper 21.4-r1-s1 (including) 21.4-r1-s1 (including)
Junos_os_evolved Juniper 21.4-r1-s2 (including) 21.4-r1-s2 (including)
Junos_os_evolved Juniper 21.4-r2 (including) 21.4-r2 (including)
Junos_os_evolved Juniper 21.4-r2-s1 (including) 21.4-r2-s1 (including)
Junos_os_evolved Juniper 21.4-r2-s2 (including) 21.4-r2-s2 (including)
Junos_os_evolved Juniper 21.4-r3 (including) 21.4-r3 (including)
Junos_os_evolved Juniper 21.4-r3-s1 (including) 21.4-r3-s1 (including)
Junos_os_evolved Juniper 21.4-r3-s2 (including) 21.4-r3-s2 (including)
Junos_os_evolved Juniper 21.4-r3-s3 (including) 21.4-r3-s3 (including)
Junos_os_evolved Juniper 21.4-r3-s4 (including) 21.4-r3-s4 (including)
Junos_os_evolved Juniper 22.1-r1 (including) 22.1-r1 (including)
Junos_os_evolved Juniper 22.1-r1-s1 (including) 22.1-r1-s1 (including)
Junos_os_evolved Juniper 22.1-r1-s2 (including) 22.1-r1-s2 (including)
Junos_os_evolved Juniper 22.1-r2 (including) 22.1-r2 (including)
Junos_os_evolved Juniper 22.1-r2-s1 (including) 22.1-r2-s1 (including)
Junos_os_evolved Juniper 22.1-r3 (including) 22.1-r3 (including)
Junos_os_evolved Juniper 22.1-r3-s1 (including) 22.1-r3-s1 (including)
Junos_os_evolved Juniper 22.1-r3-s2 (including) 22.1-r3-s2 (including)
Junos_os_evolved Juniper 22.1-r3-s3 (including) 22.1-r3-s3 (including)
Junos_os_evolved Juniper 22.2-r1 (including) 22.2-r1 (including)
Junos_os_evolved Juniper 22.2-r1-s1 (including) 22.2-r1-s1 (including)
Junos_os_evolved Juniper 22.2-r2 (including) 22.2-r2 (including)
Junos_os_evolved Juniper 22.2-r2-s1 (including) 22.2-r2-s1 (including)
Junos_os_evolved Juniper 22.2-r2-s2 (including) 22.2-r2-s2 (including)
Junos_os_evolved Juniper 22.2-r3 (including) 22.2-r3 (including)
Junos_os_evolved Juniper 22.2-r3-s1 (including) 22.2-r3-s1 (including)
Junos_os_evolved Juniper 22.3-r1 (including) 22.3-r1 (including)
Junos_os_evolved Juniper 22.3-r1-s1 (including) 22.3-r1-s1 (including)
Junos_os_evolved Juniper 22.3-r1-s2 (including) 22.3-r1-s2 (including)
Junos_os_evolved Juniper 22.3-r2 (including) 22.3-r2 (including)
Junos_os_evolved Juniper 22.3-r2-s1 (including) 22.3-r2-s1 (including)
Junos_os_evolved Juniper 22.4-r1 (including) 22.4-r1 (including)
Junos_os_evolved Juniper 22.4-r1-s1 (including) 22.4-r1-s1 (including)
Junos_os_evolved Juniper 22.4-r1-s2 (including) 22.4-r1-s2 (including)
Junos_os_evolved Juniper 22.4-r2 (including) 22.4-r2 (including)
Junos_os_evolved Juniper 23.2-r1 (including) 23.2-r1 (including)

References