Impact
A double‑free flaw in the flow usage daemon of Juniper Networks Junos OS on SRX and MX series allows an unauthenticated, network‑based attacker to trigger a crash of flowd. When a specific sequence of TCP packets occurs during a TCP session establishment the flaw is triggered, causing flowd to terminate and the faulty forwarding plane card (FPC) to restart. This results in a denial‑of‑service condition for the affected device.
Affected Systems
All Juniper Networks Junos OS on SRX and MX Series platforms are affected, including versions released before 22.4R3‑S7, before 23.2R2‑S3, before 23.4R2‑S4, and before 24.2R2. The update releases listed by Juniper—22.4R3‑S7, 23.2R2‑S3, 23.4R2‑S4, 24.2R2, 24.4R1, and any subsequent releases—contain the fix.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high severity, while the EPSS score is below 1 %, implying that true exploitation probability is low. The flaw is not currently in the CISA KEV catalog. Attackers can provoke the double‑free by sending a crafted TCP packet sequence across an unauthenticated network channel to the targeted device, so the threat is limited to networks with exposure to the SRX or MX device. Organizations should treat the risk as moderate to high and act promptly to apply the vendor‑supplied updates.
OpenCVE Enrichment