CVE-2023-28968
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2023
Last modified:
27/04/2023
Description
An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix extensive Session ID: , Status: Normal, State: Active Policy name: Dynamic application: junos:UNKNOWN,
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:juniper:appid_service_sigpack:*:*:*:*:*:*:*:* | 1.550.2-31 (excluding) | |
| cpe:2.3:a:juniper:jdpi-decoder_engine:*:*:*:*:*:*:*:* | 5.7.0-47 (excluding) | |
| cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://supportportal.juniper.net/JSA70592
- https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX
- https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf



