CVE-2023-28968
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
17/04/2023
Última modificación:
27/04/2023
Descripción
*** Pendiente de traducción *** An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix extensive Session ID: , Status: Normal, State: Active Policy name: Dynamic application: junos:UNKNOWN,
Impacto
Puntuación base 3.x
5.30
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:juniper:appid_service_sigpack:*:*:*:*:*:*:*:* | 1.550.2-31 (excluyendo) | |
| cpe:2.3:a:juniper:jdpi-decoder_engine:*:*:*:*:*:*:*:* | 5.7.0-47 (excluyendo) | |
| cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://supportportal.juniper.net/JSA70592
- https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX
- https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf



