An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause memory leak, leading to Denial of Service (DoS).
On all Junos OS QFX5000 Series platforms, when pseudo-VTEP (Virtual Tunnel End Point) is configured under EVPN-VXLAN scenario, and specific DHCP packets are transmitted, DMA memory leak is observed. Continuous receipt of these specific DHCP packets will cause memory leak to reach 99% and then cause the protocols to stop working and traffic is impacted, leading to Denial of Service (DoS) condition. A manual reboot of the system recovers from the memory leak.
To confirm the memory leak, monitor for "sheaf:possible leak" and "vtep not found" messages in the logs.
This issue affects:
Juniper Networks Junos OS QFX5000 Series:
  *  All versions prior to 20.4R3-S6;
  *  21.1 versions prior to 21.1R3-S5;
  *  21.2 versions prior to 21.2R3-S5;
  *  21.3 versions prior to 21.3R3-S4;
  *  21.4 versions prior to 21.4R3-S3;
  *  22.1 versions prior to 22.1R3-S2;
  *  22.2 versions prior to 22.2R2-S2, 22.2R3;
  *  22.3 versions prior to 22.3R2-S1, 22.3R3;
  *  22.4 versions prior to 22.4R1-S2, 22.4R2.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://supportportal.juniper.net/JSA73156 | 
                     | 
            
History
                    Wed, 18 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Juniper Networks
         Juniper Networks junos Os  | 
|
| CPEs | cpe:2.3:o:juniper_networks:junos_os:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Juniper Networks
         Juniper Networks junos Os  | 
|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-18T14:21:02.483Z
Reserved: 2023-09-26T19:30:27.954Z
Link: CVE-2023-44192
Updated: 2024-08-02T19:59:51.573Z
Status : Modified
Published: 2023-10-13T00:15:12.297
Modified: 2024-11-21T08:25:24.727
Link: CVE-2023-44192
No data.