Juniper Junos OS 多個漏洞
發佈日期:
2023年10月13日
972
觀看次數
風險: 中度風險
類型: 操作系統 - Network
於 Juniper Junos OS 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行程式碼、繞過保安限制、敏感資料洩露及資料篡改。
影響
- 阻斷服務
- 權限提升
- 遠端執行程式碼
- 繞過保安限制
- 資料洩露
- 篡改
受影響之系統或技術
Juniper Networks Junos OS
- 18.4R2 至 20.4R3-S8之前的版本
- 20.3 至 20.3R3-S5 on QFX5k之前的版本
- 20.4 至 20.4R3-S5之前的版本
- 20.4 至 20.4R3-S5 on QFX5k之前的版本
- 20.4 至 20.4R3-S9之前的版本
- 21.1 21.1R1 之前的版本
- 21.1 21.1R1 至 21.2R3-S6之前的版本
- 21.1 21.1R1-EVO 之前的版本
- 21.1 versions 21.1R1 之前的版本
- 21.1 versions 21.1R1-EVO 之前的版本
- 21.1 至 21.1R3-S2-EVO之前的版本
- 21.1 至 21.1R3-S4之前的版本
- 21.1 至 21.1R3-S4 on QFX5k之前的版本
- 21.1 至 21.1R3-S5之前的版本
- 21.1-EVO 21.1R1 之前的版本
- 21.1-EVO 21.1R1-EVO 之前的版本
- 21.1-EVO 21.1R1-EVO 之前的版本
- 21.1-EVO 21.1R1-EVO 至 21.2R3-S4-EVO之前的版本
- 21.1-EVO 21.1R1-EVO 至 21.2R3-S6-EVO之前的版本
- 21.2 至 21.2R3-S2之前的版本
- 21.2 至 21.2R3-S2-EVO之前的版本
- 21.2 至 21.2R3-S3之前的版本
- 21.2 至 21.2R3-S3 on QFX5k之前的版本
- 21.2 至 21.2R3-S4之前的版本
- 21.2 至 21.2R3-S5之前的版本
- 21.2 至 21.2R3-S5-EVO之前的版本
- 21.2 至 21.2R3-S6之前的版本
- 21.2 至 21.2R3-S6-EVO之前的版本
- 21.2-EVO 21.2R1 之前的版本
- 21.2-EVO 至 21.2R3-S2-EVO之前的版本
- 21.2-EVO 至 21.2R3-S6-EVO之前的版本
- 21.3 至 21.3R2-S2, 21.3R3-S1之前的版本
- 21.3 至 21.3R3之前的版本
- 21.3 至 21.3R3-S1-EVO之前的版本
- 21.3 至 21.3R3-S2 on QFX5k之前的版本
- 21.3 至 21.3R3-S3之前的版本
- 21.3 至 21.3R3-S4之前的版本
- 21.3 至 21.3R3-S4-EVO之前的版本
- 21.3 至 21.3R3-S5之前的版本
- 21.3 至 21.3R3-S5-EVO之前的版本
- 21.3-EVO 21.3R1-EVO 之前的版本
- 21.3-EVO 21.3R1-EVO 之前的版本
- 21.3-EVO 至 21.3R3-S2-EVO之前的版本
- 21.3-EVO 至 21.3R3-S3-EVO之前的版本
- 21.3-EVO 至 21.3R3-S5-EVO之前的版本
- 21.4 至 21.4R2-S1, 21.4R3之前的版本
- 21.4 至 21.4R2-S1, 21.4R3-S5之前的版本
- 21.4 至 21.4R2-S2, 21.4R3之前的版本
- 21.4 至 21.4R2-S2-EVO之前的版本
- 21.4 至 21.4R3之前的版本
- 21.4 至 21.4R3 on QFX5k之前的版本
- 21.4 至 21.4R3-S1之前的版本
- 21.4 至 21.4R3-S2之前的版本
- 21.4 至 21.4R3-S3之前的版本
- 21.4 至 21.4R3-S3-EVO之前的版本
- 21.4 至 21.4R3-S4之前的版本
- 21.4 至 21.4R3-S4-EVO之前的版本
- 21.4 至 21.4R3-S5之前的版本
- 21.4 至 21.4R3-S5-EVO之前的版本
- 21.4-EVO 至 21.4R2-S1-EVO, 21.4R3-EVO之前的版本
- 21.4-EVO 至 21.4R2-S1-EVO, 21.4R3-S5-EVO之前的版本
- 21.4-EVO 至 21.4R3-S3-EVO之前的版本
- 21.4-EVO 至 21.4R3-S4-EVO之前的版本
- 22.1 至 22.1R1-S2, 22.1R2之前的版本
- 22.1 至 22.1R2-S2, 22.1R3之前的版本
- 22.1 至 22.1R3之前的版本
- 22.1 至 22.1R3 on QFX5k之前的版本
- 22.1 至 22.1R3-S1之前的版本
- 22.1 至 22.1R3-S2之前的版本
- 22.1 至 22.1R3-S2-EVO之前的版本
- 22.1 至 22.1R3-S3之前的版本
- 22.1 至 22.1R3-S3-EVO之前的版本
- 22.1 至 22.1R3-S4之前的版本
- 22.1 至 22.1R3-S4-EVO之前的版本
- 22.1-EVO 22.1R1-EVO 之前的版本
- 22.1-EVO 22.1R1-EVO 至 22.2R2-S2-EVO, 22.2R3-EVO之前的版本
- 22.1-EVO 至 22.1R3-EVO之前的版本
- 22.1-EVO 至 22.1R3-S3-EVO之前的版本
- 22.1-EVO 至 22.1R3-S4-EVO之前的版本
- 22.2 versions 22.2R1-EVO 之前的版本
- 22.2 至 22.2R1-S1, 22.2R2之前的版本
- 22.2 至 22.2R2之前的版本
- 22.2 至 22.2R2 on QFX5k之前的版本
- 22.2 至 22.2R2-EVO之前的版本
- 22.2 至 22.2R2-S1, 22.2R3之前的版本
- 22.2 至 22.2R2-S2, 22.2R3之前的版本
- 22.2 至 22.2R3之前的版本
- 22.2 至 22.2R3-EVO之前的版本
- 22.2 至 22.2R3-S1之前的版本
- 22.2 至 22.2R3-S1-EVO之前的版本
- 22.2 至 22.2R3-S2之前的版本
- 22.2 至 22.2R3-S2-EVO之前的版本
- 22.2 至 22.2R3-S3-EVO之前的版本
- 22.2-EVO 22.2R1-EVO 之前的版本
- 22.2-EVO 至 22.2R2-S1-EVO, 22.2R3-EVO之前的版本
- 22.2-EVO 至 22.2R3-S2-EVO之前的版本
- 22.2-EVO 至 22.2R3-S3-EVO之前的版本
- 22.3 至 22.3R1-S2, 22.3R2之前的版本
- 22.3 至 22.3R1-S2, 22.3R2.之前的版本
- 22.3 至 22.3R2之前的版本
- 22.3 至 22.3R2-S1, 22.3R3之前的版本
- 22.3 至 22.3R2-S1, 22.3R3-S1之前的版本
- 22.3 至 22.3R2-S2之前的版本
- 22.3 至 22.3R2-S2, 22.3R3之前的版本
- 22.3 至 22.3R2-S2, 22.3R3-S1之前的版本
- 22.3 至 22.3R2-S2-EVO之前的版本
- 22.3 至 22.3R2-S2-EVO, 22.3R3-S1-EVO之前的版本
- 22.3 至 22.3R3之前的版本
- 22.3 至 22.3R3-EVO之前的版本
- 22.3-EVO 至 22.3R1-S2-EVO, 22.3R2-EVO之前的版本
- 22.3-EVO 至 22.3R2-S2-EVO, 22.3R3-EVO之前的版本
- 22.3-EVO 至 22.3R2-S2-EVO, 22.3R3-S1-EVO之前的版本
- 22.4 至 22.4R1-S1-EVO之前的版本
- 22.4 至 22.4R1-S2, 22.4R2之前的版本
- 22.4 至 22.4R2之前的版本
- 22.4 至 22.4R2-EVO之前的版本
- 22.4 至 22.4R2-EVO.之前的版本
- 22.4 至 22.4R2-S1, 22.4R3之前的版本
- 22.4 至 22.4R2-S1-EVO, 22.4R3-EVO之前的版本
- 22.4 至 22.4R2-S2, 22.4R3之前的版本
- 22.4 至 22.4R3之前的版本
- 22.4 至 22.4R3-EVO之前的版本
- 22.4-EVO 至 22.4R2-EVO之前的版本
- 22.4-EVO 至 22.4R2-S1-EVO, 22.4R3-EVO之前的版本
- 22.4-EVO 至 22.4R3-EVO之前的版本
- 23.1 至 23.1R2之前的版本
- 23.2 至 23.2R1, 23.2R2之前的版本
- 23.2 至 23.2R1-S1-EVO, 23.2R2-EVO之前的版本
- 23.2 至 23.2R2之前的版本
- 23.2 至 23.2R2-EVO之前的版本
- 23.2-EVO 至 23.2R1-EVO之前的版本
- 20.2R3-S6 on QFX5k 之前的版本
- 20.4R3-S4 之前的版本
- 20.4R3-S4-EVO 之前的版本
- 20.4R3-S5 之前的版本
- 20.4R3-S6 之前的版本
- 20.4R3-S6-EVO 之前的版本
- 20.4R3-S7 之前的版本
- 20.4R3-S7-EVO 之前的版本
- 20.4R3-S8 之前的版本
- 20.4R3-S8, 20.4R3-S9 之前版本
- 20.4R3-S8-EVO 之前的版本
- 21.4R3-S3-EVO 之前的版本
- 21.4R3-S4-EVO 之前的版本
- 21.4R3-S5-EVO 之前的版本
- 22.3R3-EVO 之前的版本
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
安裝供應商提供的修補程式,詳情請參閱以下連結:
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-An-unauthenticated-attacker-with-local-access-to-the-device-can-create-a-backdoor-with-root-privileges-CVE-2023-44194
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10001-PTX10004-PTX10008-PTX10016-MAC-address-validation-bypass-vulnerability-CVE-2023-44190
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-MAC-address-validation-bypass-vulnerability-CVE-2023-44189
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44196
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44195
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-packets-will-bypass-a-control-plane-firewall-filter-CVE-2023-44202
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-file-copy-CLI-command-can-disclose-password-to-shell-users-CVE-2023-44187
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-is-observed-when-CFM-is-enabled-in-a-VPLS-scenario-and-a-specific-LDP-related-command-is-run-CVE-2023-44193
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-In-a-PTP-scenario-a-prolonged-routing-protocol-churn-can-trigger-an-FPC-reboot-CVE-2023-44199
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-Receipt-of-malformed-TCP-traffic-will-cause-a-Denial-of-Service-CVE-2023-36841
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Received-flow-routes-which-aren-t-installed-as-the-hardware-doesn-t-support-them-lead-to-an-FPC-heap-memory-leak-CVE-2023-22392
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-DMA-memory-leak-is-observed-when-specific-DHCP-packets-are-transmitted-over-pseudo-VTEP-CVE-2023-44192
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-EX4600-Series-In-a-VxLAN-scenario-an-adjacent-attacker-within-the-VxLAN-sending-genuine-packets-may-cause-a-DMA-memory-leak-to-occur-CVE-2023-44183
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4000-Series-Denial-of-Service-DoS-on-a-large-scale-VLAN-due-to-PFE-hogging-CVE-2023-44191
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-series-EX2300-EX3400-EX4100-EX4400-and-EX4600-Packet-flooding-will-occur-when-IGMP-traffic-is-sent-to-an-isolated-VLAN-CVE-2023-44203
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5k-l2-loop-in-the-overlay-impacts-the-stability-in-a-EVPN-VXLAN-environment-CVE-2023-44181
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-SIP-ALG-doesn-t-drop-specifically-malformed-retransmitted-SIP-packets-CVE-2023-44198
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Vulnerability-fixed-in-OpenSSL
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-local-attacker-can-retrieve-sensitive-information-and-elevate-privileges-on-the-devices-to-an-authorized-user-CVE-2023-44201
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-Unchecked-Return-Value-in-multiple-users-interfaces-affects-confidentiality-and-integrity-of-device-operations-CVE-2023-44182
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-l2cpd-crash-will-occur-when-specific-LLDP-packets-are-received-CVE-2023-36839
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-may-occur-when-BGP-is-processing-newly-learned-routes-CVE-2023-44197
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-High-CPU-load-due-to-specific-NETCONF-command-CVE-2023-44184
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-NTP-vulnerabilities-resolved
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-attempting-to-send-a-very-long-AS-PATH-to-a-non-4-byte-AS-capable-BGP-neighbor-CVE-2023-44186
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-genuine-PIM-packet-causes-RPD-crash-CVE-2023-44175
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-will-crash-upon-receiving-a-malformed-BGP-UPDATE-message-CVE-2023-44204
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-jkdsd-crash-due-to-multiple-telemetry-requests-CVE-2023-44188
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-Vulnerabilities-in-CLI-command
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-The-PFE-will-crash-on-receiving-malformed-SSL-traffic-when-ATP-is-enabled-CVE-2023-36843
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-scenario-RPD-crashes-upon-receiving-and-processing-a-specific-malformed-ISO-VPN--BGP-UPDATE-packet-CVE-2023-44185
漏洞識別碼
- CVE-2022-2097
- CVE-2022-2274
- CVE-2023-22392
- CVE-2023-26551
- CVE-2023-26552
- CVE-2023-26553
- CVE-2023-26554
- CVE-2023-26555
- CVE-2023-36839
- CVE-2023-36841
- CVE-2023-36843
- CVE-2023-44175
- CVE-2023-44176
- CVE-2023-44177
- CVE-2023-44178
- CVE-2023-44181
- CVE-2023-44182
- CVE-2023-44183
- CVE-2023-44184
- CVE-2023-44185
- CVE-2023-44186
- CVE-2023-44187
- CVE-2023-44188
- CVE-2023-44189
- CVE-2023-44190
- CVE-2023-44191
- CVE-2023-44192
- CVE-2023-44193
- CVE-2023-44194
- CVE-2023-44195
- CVE-2023-44196
- CVE-2023-44197
- CVE-2023-44198
- CVE-2023-44199
- CVE-2023-44201
- CVE-2023-44202
- CVE-2023-44203
- CVE-2023-44204
資料來源
相關連結
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-An-unauthenticated-attacker-with-local-access-to-the-device-can-create-a-backdoor-with-root-privileges-CVE-2023-44194
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10001-PTX10004-PTX10008-PTX10016-MAC-address-validation-bypass-vulnerability-CVE-2023-44190
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-MAC-address-validation-bypass-vulnerability-CVE-2023-44189
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-PTX10003-Series-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44196
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Packets-which-are-not-destined-to-the-router-can-reach-the-RE-CVE-2023-44195
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-packets-will-bypass-a-control-plane-firewall-filter-CVE-2023-44202
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Evolved-file-copy-CLI-command-can-disclose-password-to-shell-users-CVE-2023-44187
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-is-observed-when-CFM-is-enabled-in-a-VPLS-scenario-and-a-specific-LDP-related-command-is-run-CVE-2023-44193
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-In-a-PTP-scenario-a-prolonged-routing-protocol-churn-can-trigger-an-FPC-reboot-CVE-2023-44199
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-MX-Series-Receipt-of-malformed-TCP-traffic-will-cause-a-Denial-of-Service-CVE-2023-36841
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-Received-flow-routes-which-aren-t-installed-as-the-hardware-doesn-t-support-them-lead-to-an-FPC-heap-memory-leak-CVE-2023-22392
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-DMA-memory-leak-is-observed-when-specific-DHCP-packets-are-transmitted-over-pseudo-VTEP-CVE-2023-44192
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-EX4600-Series-In-a-VxLAN-scenario-an-adjacent-attacker-within-the-VxLAN-sending-genuine-packets-may-cause-a-DMA-memory-leak-to-occur-CVE-2023-44183
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4000-Series-Denial-of-Service-DoS-on-a-large-scale-VLAN-due-to-PFE-hogging-CVE-2023-44191
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5000-series-EX2300-EX3400-EX4100-EX4400-and-EX4600-Packet-flooding-will-occur-when-IGMP-traffic-is-sent-to-an-isolated-VLAN-CVE-2023-44203
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-QFX5k-l2-loop-in-the-overlay-impacts-the-stability-in-a-EVPN-VXLAN-environment-CVE-2023-44181
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-SIP-ALG-doesn-t-drop-specifically-malformed-retransmitted-SIP-packets-CVE-2023-44198
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-Vulnerability-fixed-in-OpenSSL
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-local-attacker-can-retrieve-sensitive-information-and-elevate-privileges-on-the-devices-to-an-authorized-user-CVE-2023-44201
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-Unchecked-Return-Value-in-multiple-users-interfaces-affects-confidentiality-and-integrity-of-device-operations-CVE-2023-44182
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-l2cpd-crash-will-occur-when-specific-LLDP-packets-are-received-CVE-2023-36839
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-may-occur-when-BGP-is-processing-newly-learned-routes-CVE-2023-44197
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-High-CPU-load-due-to-specific-NETCONF-command-CVE-2023-44184
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-NTP-vulnerabilities-resolved
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-attempting-to-send-a-very-long-AS-PATH-to-a-non-4-byte-AS-capable-BGP-neighbor-CVE-2023-44186
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-genuine-PIM-packet-causes-RPD-crash-CVE-2023-44175
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-will-crash-upon-receiving-a-malformed-BGP-UPDATE-message-CVE-2023-44204
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-jkdsd-crash-due-to-multiple-telemetry-requests-CVE-2023-44188
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-Vulnerabilities-in-CLI-command
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-SRX-Series-The-PFE-will-crash-on-receiving-malformed-SSL-traffic-when-ATP-is-enabled-CVE-2023-36843
- https://supportportal.juniper.net/s/article/2023-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-scenario-RPD-crashes-upon-receiving-and-processing-a-specific-malformed-ISO-VPN--BGP-UPDATE-packet-CVE-2023-44185
分享至