QID 43924

Date Published: 2022-10-18

QID 43924: Juniper Network Operating System (Junos OS) Denial of Service (DoS) Vulnerability (JSA11286)

Juniper Junos is the network operating system used in Juniper Networks hardware systems.

An Improper Check for Unusual or Exceptional Conditions vulnerability in the processing of specific IPv6 packets on certain EX Series devices may lead to exhaustion of DMA memory causing a Denial of Service (DoS). Over time, exploitation of this vulnerability may cause traffic to stop being forwarded, or a crash of the fxpc process.

Affected Junos OS versions:
18.4 versions prior to 18.4R2-S10, 18.4R3-S10 19.1 versions prior to 19.1R3-S7 19.2 versions prior to 19.2R1-S8, 19.2R3-S4 19.3 versions prior to 19.3R3-S5 19.4 versions prior to 19.4R3-S7 20.1 versions prior to 20.1R3-S3 20.2 versions prior to 20.2R3-S3 20.3 versions prior to 20.3R3-S2 20.4 versions prior to 20.4R3-S1 21.1 versions prior to 21.1R2-S2, 21.1R3 21.2 versions prior to 21.2R1-S2, 21.2R2 21.3 versions prior to 21.3R1-S1, 21.3R2 NOTE:
This vulnerability only affects to EX2300 Series, EX2300-MP Series, EX3400.

QID detection logic: (Authenticated)
It checks for vulnerable Junos OS version.

Successful exploitation of this vulnerability may lead to an inoperable state of the affected system causing a DoS.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    The following software releases have been updated to resolve this specific issue For more information please visit JSA11286

    Workaround:
    If IPv6 is not used in the environment, to prevent the issue an administrator can apply a firewall filter for blocking IPv6 packets on the ingress port where the traffic might be received: [firewall family ethernet-switching filter BLOCK-IPv6 interface-specific] [firewall family ethernet-switching filter BLOCK-IPv6 term 1 from ether-type ipv6] [firewall family ethernet-switching filter BLOCK-IPv6 term 1 then discard] [firewall family ethernet-switching filter BLOCK-IPv6 term 1 then count BLOCK-IPv6 COUNT] [firewall family ethernet-switching filter BLOCK-IPv6 term default then accept] [interfaces interface ID family ethernet-switching filter input BLOCK-IPv6]

    Vendor References

    CVEs related to QID 43924

    Software Advisories
    Advisory ID Software Component Link
    JSA11286 URL Logo kb.juniper.net/JSA11286