Impact
An improperly evaluated condition in Juniper's flow daemon during NAT64 translation allows an attacker to send a specifically crafted malformed ICMPv6 packet that causes the srxpfe process to crash. The crash forces the process to restart repeatedly, resulting in a persistent denial‑of‑service that interrupts traffic handling. This weakness is a failure to perform a required check against unusual or exceptional conditions and is classified as CWE‑754.
Affected Systems
Juniper Network's Junos OS on SRX Series devices are affected. All releases before the patched versions are vulnerable, including every release prior to 21.2R3‑S10, all 21.3 releases, pre‑21.4R3‑S12 releases of 21.4, all 22.1 releases, pre‑22.2R3‑S8 releases of 22.2, all 22.4 releases, pre‑22.4R3‑S9 releases of 22.4, pre‑23.2R2‑S6 releases of 23.2, pre‑23.4R2‑S7 releases of 23.4, pre‑24.2R2‑S3 releases of 24.2, pre‑24.4R2‑S3 releases of 24.4, and versions of 25.2 before 25.2R1‑S2 and 25.2R2.
Risk and Exploitability
The vulnerability has a CVSS score of 8.7, indicating high severity. No EPSS score is provided, but the requirement for NAT64 configuration limits the attack surface. An adversary would need to craft a precise malformed ICMPv6 packet and target a device configured for NAT64; typical IPv4 or other IPv6 traffic does not trigger the crash. The attack results in repeated process restarts and a sustained denial of service until patched or removed from NAT64 mode. The CISA KEV list does not include this issue.
OpenCVE Enrichment