NA

CVE-2023-22416

Published: 13/01/2023 Updated: 20/01/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated malicious user to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions before 20.4R3-S5; 21.1 versions before 21.1R3-S4; 21.2 versions before 21.2R3-S2; 21.3 versions before 21.3R3-S1; 21.4 versions before 21.4R3; 22.1 versions before 22.1R1-S2, 22.1R2; 22.2 versions before 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions before 20.4R1 on SRX Series.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2

juniper junos 21.3

juniper junos 21.4

juniper junos 22.1

juniper junos 22.2