No analysis available yet.
Vendor Solution
The following software releases have been updated to resolve this specific issue: 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.
Vendor Workaround
There are no known workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26575 | An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series. |
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA70208 |
|
Mon, 07 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-04-07T15:32:13.451Z
Reserved: 2022-12-27T00:00:00.000Z
Link: CVE-2023-22412
Updated: 2024-08-02T10:07:06.654Z
Status : Modified
Published: 2023-01-13T00:15:11.450
Modified: 2024-11-21T07:44:46.020
Link: CVE-2023-22412
No data.
OpenCVE Enrichment
No data.
EUVD