An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.
On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.
This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.
In order to identify the current SigPack version, following command can be used:
user@junos# show security idp security-package-version
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA71662 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
27 Jul 2023, 13:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* |
|
First Time |
Juniper mx40
Juniper srx240 Juniper mx10016 Juniper srx5600 Juniper srx340 Juniper vsrx Juniper srx3400 Juniper mx80 Juniper srx650 Juniper srx4000 Juniper srx240h2 Juniper mx204 Juniper mx2008 Juniper mx2010 Juniper mx480 Juniper srx5800 Juniper srx4200 Juniper Juniper mx10000 Juniper srx550 Juniper srx550m Juniper csrx Juniper srx380 Juniper srx4100 Juniper mx2020 Juniper srx1400 Juniper mx104 Juniper mx10008 Juniper mx10 Juniper srx220 Juniper srx550 Hm Juniper srx240m Juniper srx4600 Juniper srx5400 Juniper srx300 Juniper srx3600 Juniper mx5 Juniper mx240 Juniper srx210 Juniper mx960 Juniper srx345 Juniper junos Juniper srx5000 Juniper srx100 Juniper srx1500 Juniper srx110 Juniper mx10003 Juniper mx150 Juniper srx320 |
|
References | (MISC) https://supportportal.juniper.net/JSA71662 - Vendor Advisory |
14 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-14 17:15
Updated : 2023-12-10 15:14
NVD link : CVE-2023-28985
Mitre link : CVE-2023-28985
CVE.ORG link : CVE-2023-28985
JSON object : View
Products Affected
juniper
- mx204
- mx2010
- srx4100
- srx320
- mx2020
- srx4200
- mx10
- mx10000
- srx5800
- srx1500
- srx3400
- srx5400
- srx110
- srx550m
- mx480
- srx210
- mx104
- vsrx
- mx240
- mx80
- srx220
- srx3600
- mx10003
- srx4600
- srx240m
- srx550_hm
- srx4000
- srx5000
- junos
- mx2008
- srx240h2
- mx10016
- srx5600
- srx550
- srx380
- mx960
- srx240
- mx5
- csrx
- srx340
- srx345
- srx1400
- srx650
- mx10008
- mx150
- mx40
- srx100
- srx300
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input