7.5
CVE-2023-28985
- EPSS 0.14%
- Published 14.07.2023 17:15:09
- Last modified 21.11.2024 07:56:20
- Source sirt@juniper.net
- Teams watchlist Login
- Open Login
An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition. On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core. This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598. In order to identify the current SigPack version, following command can be used: user@junos# show security idp security-package-version
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Junos Version-
Juniper ≫ Vsrx Version-
Juniper ≫ Csrx Version-
Juniper ≫ Mx10 Version-
Juniper ≫ Mx10000 Version-
Juniper ≫ Mx10003 Version-
Juniper ≫ Mx10008 Version-
Juniper ≫ Mx10016 Version-
Juniper ≫ Mx104 Version-
Juniper ≫ Mx150 Version-
Juniper ≫ Mx2008 Version-
Juniper ≫ Mx2010 Version-
Juniper ≫ Mx2020 Version-
Juniper ≫ Mx204 Version-
Juniper ≫ Mx240 Version-
Juniper ≫ Mx40 Version-
Juniper ≫ Mx480 Version-
Juniper ≫ Mx5 Version-
Juniper ≫ Mx80 Version-
Juniper ≫ Mx960 Version-
Juniper ≫ Srx100 Version-
Juniper ≫ Srx110 Version-
Juniper ≫ Srx1400 Version-
Juniper ≫ Srx1500 Version-
Juniper ≫ Srx210 Version-
Juniper ≫ Srx220 Version-
Juniper ≫ Srx240 Version-
Juniper ≫ Srx240h2 Version-
Juniper ≫ Srx240m Version-
Juniper ≫ Srx300 Version-
Juniper ≫ Srx320 Version-
Juniper ≫ Srx340 Version-
Juniper ≫ Srx3400 Version-
Juniper ≫ Srx345 Version-
Juniper ≫ Srx3600 Version-
Juniper ≫ Srx380 Version-
Juniper ≫ Srx4000 Version-
Juniper ≫ Srx4100 Version-
Juniper ≫ Srx4200 Version-
Juniper ≫ Srx4600 Version-
Juniper ≫ Srx5000 Version-
Juniper ≫ Srx5400 Version-
Juniper ≫ Srx550 Version-
Juniper ≫ Srx550 Hm Version-
Juniper ≫ Srx550m Version-
Juniper ≫ Srx5600 Version-
Juniper ≫ Srx5800 Version-
Juniper ≫ Srx650 Version-
Juniper ≫ Csrx Version-
Juniper ≫ Mx10 Version-
Juniper ≫ Mx10000 Version-
Juniper ≫ Mx10003 Version-
Juniper ≫ Mx10008 Version-
Juniper ≫ Mx10016 Version-
Juniper ≫ Mx104 Version-
Juniper ≫ Mx150 Version-
Juniper ≫ Mx2008 Version-
Juniper ≫ Mx2010 Version-
Juniper ≫ Mx2020 Version-
Juniper ≫ Mx204 Version-
Juniper ≫ Mx240 Version-
Juniper ≫ Mx40 Version-
Juniper ≫ Mx480 Version-
Juniper ≫ Mx5 Version-
Juniper ≫ Mx80 Version-
Juniper ≫ Mx960 Version-
Juniper ≫ Srx100 Version-
Juniper ≫ Srx110 Version-
Juniper ≫ Srx1400 Version-
Juniper ≫ Srx1500 Version-
Juniper ≫ Srx210 Version-
Juniper ≫ Srx220 Version-
Juniper ≫ Srx240 Version-
Juniper ≫ Srx240h2 Version-
Juniper ≫ Srx240m Version-
Juniper ≫ Srx300 Version-
Juniper ≫ Srx320 Version-
Juniper ≫ Srx340 Version-
Juniper ≫ Srx3400 Version-
Juniper ≫ Srx345 Version-
Juniper ≫ Srx3600 Version-
Juniper ≫ Srx380 Version-
Juniper ≫ Srx4000 Version-
Juniper ≫ Srx4100 Version-
Juniper ≫ Srx4200 Version-
Juniper ≫ Srx4600 Version-
Juniper ≫ Srx5000 Version-
Juniper ≫ Srx5400 Version-
Juniper ≫ Srx550 Version-
Juniper ≫ Srx550 Hm Version-
Juniper ≫ Srx550m Version-
Juniper ≫ Srx5600 Version-
Juniper ≫ Srx5800 Version-
Juniper ≫ Srx650 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.349 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
sirt@juniper.net | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-1286 Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.