Vulnérabilités affectant des produits Juniper

TitreVulnérabilités affectant des produits Juniper
Numéro de Référence
Numéro de Référence
39801601/23
Date de publication
Date de publication
16 janvier 2023
Niveau de Risque
Niveau de Risque
Modéré
Niveau d'Impact
Niveau d'Impact
Modéré

Systèmes affectés:

Systèmes affectés
  • Juniper Networks Junos OS
  • Juniper Networks Junos OS Evolved
  • Juniper Networks Junos OS on SRX Series
  • Juniper Networks Junos OS on vSRX 3.0
  • Contrail Service Orchestration  Juniper Junos OS: QFX10k Series
  • Juniper Junos OS Evolved: PTX10003
  • Juniper Junos OS: SRX 5000 Series
  • Juniper Northstar Controller
  • Juniper Junos OS: MX Series
  • Juniper Junos OS: ACX2K Series
  • Juniper Junos Space
  • Contrail Cloud
  • Juniper Junos OS: QFX5k Series, EX46xx Series

Identificateurs externes:

Identificateurs externes

CVE-2022-22229 CVE-2022-22239 CVE-2022-0778 CVE-2022-3602 CVE-2022-3786 CVE-2023-22414 CVE-2023-22394 CVE-2022-22219 CVE-2023-22397 CVE-2023-22404 CVE-2023-22395 CVE-2023-22417 CVE-2023-22402 CVE-2023-22411 CVE-2023-22391 CVE-2023-22412 CVE-2023-22415 CVE-2023-22401 CVE-2023-22398 CVE-2023-22416 CVE-2023-22408 CVE-2023-22403

Bilan de la vulnérabilité:

Bilan de la vulnérabilité

Juniper annonce la correction de plusieurs vulnérabilités qui affectent certains de ses produits. Un attaquant distant pourrait exploiter ces failles afin d’exécuter du code arbitraire, injecter du contenu dans une page, accéder à des informations confidentielles ou causer un déni de service.

Solution:

Solution

Veuillez se référer aux bulletins de sécurité de Juniper afin d’installer les nouvelles mises à jour.

Risque:

Risque
  • Exécution de code arbitraire à distance.
  • Déni de service à distance.
  • Injection de contenu dans une page
  • Accès à des données confidentielles

Annexe:

Annexe

Bulletins de sécurité juniper:

  •  https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10kSeries-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023- 22403?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-EvolvedPTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-thePFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-JunosOS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-changeon-a-directly-connected-router-CVE-2023-22407?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-SeriesMX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLIcommand-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-ServiceOrchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000- Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023- 22408?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-JunosOS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observedwhen-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023- 22406?language=en_US
  •  https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-ControllerPivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-ofService-DoS-attack-CVE-2019-11287?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10KSeries-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE2023-22399?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-SeriesThe-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-isreceived-CVE-2023-22416?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-JunosOS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-JunosOS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificatesCVE-2022-0778?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-JunosOS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-willcrash-CVE-2023-22401?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Seriesand-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Seriesand-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specificSIP-messages-are-processed-CVE-2023-22412?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Seriesand-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-JunosOS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2KSeries-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE2023-22391?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Seriesand-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packetsare-processed-CVE-2023-22414?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiplevulnerabilities-resolved-in-22-3R1-release?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-SeriesFPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-SeriesFPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Thekernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-aneighbor-flaps-CVE-2023-22402?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-SeriesA-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE2023-22417?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-CloudMultiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-
    0?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLSscenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-andultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Seriesand-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-aspecifically-formatted-payload-is-received-CVE-2023-22404?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-EvolvedMultiple-vulnerabilities-resolved-in-OpenSSL?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Serieswith-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-anattacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5kSeries-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-devicereboot--CVE-2023-22405?language=en_US
  • https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-ofcrafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-ofService-DoS-CVE-2023-22396?language=en_US

Pour signaler tout contenu numérique criminel, incluant atteinte à la sécurité des individus et des groupes, louanges ou incitations au terrorisme, et atteinte aux droits et libertés des enfants, utilisez la plateforme suivante : www.e-blagh.ma

DGSSI2024 All rights reserved