Junos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481)
CVE-2023-4481

7.5HIGH

Key Information:

Vendor
CVE Published:
1 September 2023

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2023-4481?

An improper input validation vulnerability exists in the Routing Protocol Daemon (rpd) of Junos OS and Junos OS Evolved. An unauthenticated attacker can exploit this vulnerability by sending specifically crafted BGP UPDATE messages over an established BGP session, potentially causing a Denial of Service (DoS). This attack can lead to the tear down of BGP sessions, which could affect both eBGP and iBGP implementations in IPv4 and IPv6. The harmful UPDATE messages can propagate through unaffected systems, resulting in sustained service disruption for targeted devices.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Junos OS 0

Junos OS 0 < 20.4R3-S10

Junos OS 21.2 < 21.2R3-S5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ben Cartwright-Cox / bgp.tools
.