7.5

CVE-2023-28985

An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.

On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.

This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.

In order to identify the current SigPack version, following command can be used:

user@junos# show security idp security-package-version

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version-
   JuniperVsrx Version-
   JuniperCsrx Version-
   JuniperMx10 Version-
   JuniperMx10000 Version-
   JuniperMx10003 Version-
   JuniperMx10008 Version-
   JuniperMx10016 Version-
   JuniperMx104 Version-
   JuniperMx150 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx40 Version-
   JuniperMx480 Version-
   JuniperMx5 Version-
   JuniperMx80 Version-
   JuniperMx960 Version-
   JuniperSrx100 Version-
   JuniperSrx110 Version-
   JuniperSrx1400 Version-
   JuniperSrx1500 Version-
   JuniperSrx210 Version-
   JuniperSrx220 Version-
   JuniperSrx240 Version-
   JuniperSrx240h2 Version-
   JuniperSrx240m Version-
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx3400 Version-
   JuniperSrx345 Version-
   JuniperSrx3600 Version-
   JuniperSrx380 Version-
   JuniperSrx4000 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5000 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx550 Hm Version-
   JuniperSrx550m Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
   JuniperSrx650 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.14% 0.349
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-1286 Improper Validation of Syntactic Correctness of Input

The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.