CVE-2023-22408

CVSS V2 None CVSS V3 None
Description
An Improper Validation of Array Index vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX 5000 Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an attacker sends an SIP packets with a malformed SDP field then the SIP ALG can not process it which will lead to an FPC crash and restart. Continued receipt of these specific packets will lead to a sustained Denial of Service. This issue can only occur when both below mentioned conditions are fulfilled: 1. Call distribution needs to be enabled: [security alg sip enable-call-distribution] 2. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX, and MX with SPC3 use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX 5000 Series: 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
Overview
  • CVE ID
  • CVE-2023-22408
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-13T00:15:11
  • Last Modified Date
  • 2023-01-24T17:13:56
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* 0 OR
References
Reference URL Reference Tags
https://kb.juniper.net/JSA70204
History
Created Old Value New Value Data Type Notes
2023-01-13 00:20:52 Added to TrackCVE
2023-01-13 00:20:54 Weakness Enumeration new
2023-01-13 05:15:12 2023-01-13T05:12:35 CVE Modified Date updated
2023-01-13 05:15:12 Received Awaiting Analysis Vulnerability Status updated
2023-01-20 15:14:46 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-24 18:12:40 2023-01-24T17:13:56 CVE Modified Date updated
2023-01-24 18:12:40 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-24 18:12:43 CPE Information updated