An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.
If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.
This issue affects Juniper Networks Junos OS on SRX Series and MX Series:
* 20.4 versions prior to 20.4R3-S5;
* 21.1 versions prior to 21.1R3-S4;
* 21.2 versions prior to 21.2R3-S4;
* 21.3 versions prior to 21.3R3-S3;
* 21.4 versions prior to 21.4R3-S2;
* 22.1 versions prior to 22.1R2-S2, 22.1R3;
* 22.2 versions prior to 22.2R2-S1, 22.2R3;
* 22.3 versions prior to 22.3R1-S2, 22.3R2.
This issue doesn't not affected releases prior to 20.4R1.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Juniper
Subscribe
|
Junos
Subscribe
Mx10003
Subscribe
Mx10004
Subscribe
Mx10008
Subscribe
Mx2008
Subscribe
Mx2010
Subscribe
Mx2020
Subscribe
Mx204
Subscribe
Mx240
Subscribe
Mx304
Subscribe
Mx480
Subscribe
Mx960
Subscribe
Srx1500
Subscribe
Srx1600
Subscribe
Srx2300
Subscribe
Srx300
Subscribe
Srx320
Subscribe
Srx340
Subscribe
Srx345
Subscribe
Srx380
Subscribe
Srx4100
Subscribe
Srx4200
Subscribe
Srx4300
Subscribe
Srx4600
Subscribe
Srx4700
Subscribe
Srx5400
Subscribe
Srx550
Subscribe
Srx5600
Subscribe
Srx5800
Subscribe
|
|
Juniper Networks
Subscribe
|
Junos Os
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48557 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks. If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: * 20.4 versions prior to 20.4R3-S5; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S4; * 21.3 versions prior to 21.3R3-S3; * 21.4 versions prior to 21.4R3-S2; * 22.1 versions prior to 22.1R2-S2, 22.1R3; * 22.2 versions prior to 22.2R2-S1, 22.2R3; * 22.3 versions prior to 22.3R1-S2, 22.3R2. This issue doesn't not affected releases prior to 20.4R1. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S5, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R2-S2, 22.1R3, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.
Workaround
There are no known workarounds for this issue.
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA73164 |
|
Wed, 18 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper Networks
Juniper Networks junos Os |
|
| CPEs | cpe:2.3:o:juniper_networks:junos_os:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Juniper Networks
Juniper Networks junos Os |
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-18T14:41:11.841Z
Reserved: 2023-09-26T19:30:32.350Z
Link: CVE-2023-44198
Updated: 2024-08-02T19:59:51.680Z
Status : Modified
Published: 2023-10-13T00:15:12.760
Modified: 2024-11-21T08:25:25.567
Link: CVE-2023-44198
No data.
OpenCVE Enrichment
No data.
EUVD