An Improper Handling of Inconsistent Special Elements vulnerability in the Junos Services Framework (jsf) module of Juniper Networks Junos OS allows an unauthenticated network based malicious user to cause a crash in the Packet Forwarding Engine (pfe) and thereby resulting in a Denial of Service (DoS). Upon receiving malformed SSL traffic, the PFE crashes. A manual restart will be needed to recover the device. This issue only affects devices with Juniper Networks Advanced Threat Prevention (ATP) Cloud enabled with Encrypted Traffic Insights (configured via ‘security-metadata-streaming policy’). This issue affects Juniper Networks Junos OS: * All versions before 20.4R3-S8, 20.4R3-S9; * 21.1 version 21.1R1 and later versions; * 21.2 versions before 21.2R3-S6; * 21.3 versions before 21.3R3-S5; * 21.4 versions before 21.4R3-S5; * 22.1 versions before 22.1R3-S4; * 22.2 versions before 22.2R3-S2; * 22.3 versions before 22.3R2-S2, 22.3R3; * 22.4 versions before 22.4R2-S1, 22.4R3;
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos 20.4 |
||
juniper junos 21.1 |
||
juniper junos 21.2 |
||
juniper junos 21.3 |
||
juniper junos 21.4 |
||
juniper junos 22.1 |
||
juniper junos 22.2 |
||
juniper junos 22.3 |
||
juniper junos |
||
juniper junos 22.4 |