Vulnerability Details : CVE-2023-22412
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
Vulnerability category: Denial of service
Products affected by CVE-2023-22412
- cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22412
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22412
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2023-22412
-
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
References for CVE-2023-22412
-
https://kb.juniper.net/JSA70208
2023-01 Security Bulletin: Junos OS: MX Series and SRX Series: The flowd daemon will crash if the SIP ALG is enabled and specific SIP messages are processed (CVE-2023-22412)Vendor Advisory
Jump to