CVE-2023-22412

CVSS V2 None CVSS V3 None
Description
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
Overview
  • CVE ID
  • CVE-2023-22412
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-13T00:15:11
  • Last Modified Date
  • 2023-01-24T17:23:47
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* 0 OR
References
Reference URL Reference Tags
https://kb.juniper.net/JSA70208
History
Created Old Value New Value Data Type Notes
2023-01-13 00:20:55 Added to TrackCVE
2023-01-13 00:20:56 Weakness Enumeration new
2023-01-13 05:15:13 2023-01-13T05:12:35 CVE Modified Date updated
2023-01-13 05:15:13 Received Awaiting Analysis Vulnerability Status updated
2023-01-20 17:13:50 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-24 18:12:41 2023-01-24T17:23:47 CVE Modified Date updated
2023-01-24 18:12:41 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-24 18:12:45 CPE Information updated