An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.
On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.
This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.
In order to identify the current SigPack version, following command can be used:
user@junos# show security idp security-package-version
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA71662 | Vendor Advisory |
https://supportportal.juniper.net/JSA71662 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportportal.juniper.net/JSA71662 - Vendor Advisory |
27 Jul 2023, 13:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Juniper srx5400
Juniper srx3600 Juniper srx4000 Juniper srx5000 Juniper mx150 Juniper mx40 Juniper srx5600 Juniper srx240m Juniper srx210 Juniper srx650 Juniper junos Juniper mx10003 Juniper srx550 Juniper srx380 Juniper srx1400 Juniper mx2010 Juniper mx204 Juniper srx110 Juniper mx10016 Juniper mx2008 Juniper srx5800 Juniper mx104 Juniper srx300 Juniper mx5 Juniper mx960 Juniper srx550m Juniper srx240h2 Juniper srx4100 Juniper srx4600 Juniper mx10 Juniper mx480 Juniper mx240 Juniper srx1500 Juniper srx3400 Juniper vsrx Juniper mx10000 Juniper mx80 Juniper srx4200 Juniper srx320 Juniper srx220 Juniper srx550 Hm Juniper csrx Juniper srx340 Juniper srx100 Juniper srx240 Juniper Juniper mx10008 Juniper mx2020 Juniper srx345 |
|
References | (MISC) https://supportportal.juniper.net/JSA71662 - Vendor Advisory | |
CPE | cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* |
14 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-14 17:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-28985
Mitre link : CVE-2023-28985
CVE.ORG link : CVE-2023-28985
JSON object : View
Products Affected
juniper
- srx5400
- mx10008
- mx10000
- mx10016
- srx4200
- srx4600
- junos
- mx2008
- mx204
- srx300
- srx240h2
- srx550_hm
- mx150
- mx10003
- mx960
- srx5800
- srx5600
- srx240
- srx210
- srx5000
- mx104
- srx220
- srx110
- mx240
- mx480
- srx1400
- mx80
- srx240m
- csrx
- srx320
- srx4000
- vsrx
- srx345
- srx650
- mx2010
- srx3600
- srx1500
- srx4100
- mx2020
- mx5
- srx340
- srx3400
- srx100
- srx550m
- srx380
- mx10
- mx40
- srx550
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input