SB2023011170 - Unchecked input for loop condition in Juniper Junos OS
Published: January 11, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Unchecked input for loop condition (CVE-ID: CVE-2023-22409)
The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
The vulnerability exists due to unchecked input for loop condition error in a NAT library. A local authenticated user can cause a Denial of Service (DoS).
When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart.
Repeated execution of this command will lead to a sustained DoS.
Remediation
Install update from vendor's website.