Vulnerabilidad en Juniper Networks Junos OS (CVE-2023-22412)
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/01/2023
Última modificación:
24/01/2023
Descripción
*** Pendiente de traducción *** An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página