Vulnerability Database

289,697

Total vulnerabilities in the database

CVE-2023-44189

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device.

This issue affects Juniper Networks Junos OS Evolved on PTX10003 Series:

  • All versions prior to 21.4R3-S4-EVO;
  • 22.1 versions prior to 22.1R3-S3-EVO;
  • 22.2 version 22.2R1-EVO and later versions;
  • 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
  • 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;
  • 23.2 versions prior to 23.2R2-EVO.
  • Published: Oct 12, 2023
  • Updated: Oct 20, 2023
  • CVE: CVE-2023-44189
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 5.4
  • AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

CWEs:

Software From Fixed in
juniper / junos_os_evolved - 21.4
juniper / junos_os_evolved 21.4-r3 21.4-r3.x
juniper / junos_os_evolved 21.4-r1 21.4-r1.x
juniper / junos_os_evolved 21.4-r1-s1 21.4-r1-s1.x
juniper / junos_os_evolved 21.4 21.4.x
juniper / junos_os_evolved 21.4-r2 21.4-r2.x
juniper / junos_os_evolved 21.4-r2-s1 21.4-r2-s1.x
juniper / junos_os_evolved 21.4-r2-s2 21.4-r2-s2.x
juniper / junos_os_evolved 21.4-r1-s2 21.4-r1-s2.x
juniper / junos_os_evolved 21.4-r3-s1 21.4-r3-s1.x
juniper / junos_os_evolved 21.4-r3-s2 21.4-r3-s2.x
juniper / junos_os_evolved 21.4-r3-s3 21.4-r3-s3.x
juniper / junos_os_evolved 22.1-r1-s1 22.1-r1-s1.x
juniper / junos_os_evolved 22.1-r1-s2 22.1-r1-s2.x
juniper / junos_os_evolved 22.1-r1 22.1-r1.x
juniper / junos_os_evolved 22.1-r2 22.1-r2.x
juniper / junos_os_evolved 22.1-r2-s1 22.1-r2-s1.x
juniper / junos_os_evolved 22.1-r3 22.1-r3.x
juniper / junos_os_evolved 22.1-r3-s1 22.1-r3-s1.x
juniper / junos_os_evolved 22.1-r3-s2 22.1-r3-s2.x
juniper / junos_os_evolved 22.2-r2-s2 22.2-r2-s2.x
juniper / junos_os_evolved 22.2-r3 22.2-r3.x
juniper / junos_os_evolved 22.2-r2 22.2-r2.x
juniper / junos_os_evolved 22.2-r3-s1 22.2-r3-s1.x
juniper / junos_os_evolved 22.2-r2-s1 22.2-r2-s1.x
juniper / junos_os_evolved 22.2-r1-s1 22.2-r1-s1.x
juniper / junos_os_evolved 22.2-r1 22.2-r1.x
juniper / junos_os_evolved 22.3-r1 22.3-r1.x
juniper / junos_os_evolved 22.3-r2-s1 22.3-r2-s1.x
juniper / junos_os_evolved 22.3-r1-s1 22.3-r1-s1.x
juniper / junos_os_evolved 22.3-r1-s2 22.3-r1-s2.x
juniper / junos_os_evolved 22.3-r2 22.3-r2.x
juniper / junos_os_evolved 22.4-r1 22.4-r1.x
juniper / junos_os_evolved 22.4-r1-s1 22.4-r1-s1.x
juniper / junos_os_evolved 22.4-r1-s2 22.4-r1-s2.x
juniper / junos_os_evolved 22.4-r2 22.4-r2.x
juniper / junos_os_evolved 23.2-r1 23.2-r1.x
juniper / junos_os_evolved 23.2-r1-s1 23.2-r1-s1.x