![]() ![]() This issue affects Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S8-EVO * 21.1-EVO version 21.1R1-EVO and later * 21.2-EVO versions prior to 21.2R3-S6-EVO * 21.3-EVO version 21.3R1-EVO and later * 21.4-EVO versions prior to 21.4R3-S3-EVO * 22.1-EVO versions prior to 22.1R3-S4-EVO * 22.2-EVO versions prior to 22.2R3-S3-EVO * 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO * 22.4-EVO versions prior to 22.4R2-EVO. This issue is a prerequisite for CVE-2023-44195. When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. The following log message can be seen when the issue occurs: Cmerror Op Set: Host Loopback: HOST LOOPBACK WEDGE DETECTED IN PATH ID (URI: /fpc//pfe//cm//Host_Loopback//HOST_LOOPBACK_MAKE_CMERROR_ID) This issue affects Juniper Networks Junos OS: * All versions earlier than 20.4R3-S8 * 21.1 versions earlier than 21.1R3-S4 * 21.2 versions earlier than 21.2R3-S6 * 21.3 versions earlier than 21.3R3-S3 * 21.4 versions earlier than 21.4R3-S5 * 22.1 versions earlier than 22.1R2-S2, 22.1R3 * 22.2 versions earlier than 22.2R2-S1, 22.2R3.Īn Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system. Other PTX Series devices and Line Cards (LC) are not affected. ![]() Please note that this issue specifically affects PTX1000, PTX3000, PTX5000 with FPC3, PTX10002-60C, and PTX10008/16 with LC110x. ![]() This will cause the FPC to hang and requires a manual restart to recover. When MPLS packets are meant to be sent to a flexible tunnel interface (FTI) and if the FTI tunnel is down, these will hit the reject NH, due to which the packets get sent to the CPU and cause a host path wedge condition. An Improper Neutralization of Equivalent Special Elements vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows a unauthenticated, adjacent attacker to cause a Denial of Service (DoS). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |