{"uuid": "c3d97ea1-2923-4701-a6a4-66cd0e08df71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22403", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10791", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-22403\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: \nAn Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\n\n\nOn QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device.\n\n\n\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\n\n  *  All versions prior to 20.2R3-S7;\n  *  20.4 versions prior to 20.4R3-S4;\n  *  21.1 versions prior to 21.1R3-S3;\n  *  21.2 versions prior to 21.2R3-S1;\n  *  21.3 versions prior to 21.3R3;\n  *  21.4 versions prior to 21.4R3;\n  *  22.1 versions prior to 22.1R2.\n\n\n\n\n\n\ud83d\udccf Published: 2023-01-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-07T19:55:11.399Z\n\ud83d\udd17 References:\n1. https://kb.juniper.net/JSA70199", "creation_timestamp": "2025-04-07T20:46:22.000000Z"}