Vulnerabilites related to juniper - srx550m
cve-2021-25220
Vulnerability from cvelistv5
Published
2022-03-23 12:50
Modified
2024-09-16 17:08
Summary
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
Impacted products
Vendor Product Version
ISC BIND Version: Open Source Branch 9.11 9.11.0 through versions before 9.11.37
Version: Development Branch 9.17 BIND 9.17 all version
Version: Open Source Branch 9.12-16 9.12.0 through versions before 9.16.27
Version: Open Source Branch 9.18 9.18.0
Version: Supported Preview Branch 9.11-S 9.11.0-S through versions before 9.11.37-S
Version: Supported Preview Branch 9.16-S 9.16.0-S through versions before 9.16.27-S
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T19:56:11.083Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/v1/docs/cve-2021-25220",
               },
               {
                  name: "FEDORA-2022-14e36aac0c",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/",
               },
               {
                  name: "FEDORA-2022-042d9c6146",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20220408-0001/",
               },
               {
                  name: "FEDORA-2022-a88218de5c",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/",
               },
               {
                  name: "FEDORA-2022-05918f0838",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/",
               },
               {
                  name: "FEDORA-2022-3f293290c3",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
               },
               {
                  name: "GLSA-202210-25",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202210-25",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "BIND",
               vendor: "ISC",
               versions: [
                  {
                     status: "affected",
                     version: "Open Source Branch 9.11  9.11.0 through versions before 9.11.37",
                  },
                  {
                     status: "affected",
                     version: "Development Branch 9.17  BIND 9.17 all version",
                  },
                  {
                     status: "affected",
                     version: "Open Source Branch 9.12-16  9.12.0 through versions before 9.16.27",
                  },
                  {
                     status: "affected",
                     version: "Open Source Branch 9.18 9.18.0",
                  },
                  {
                     status: "affected",
                     version: "Supported Preview Branch 9.11-S 9.11.0-S through versions before 9.11.37-S",
                  },
                  {
                     status: "affected",
                     version: "Supported Preview Branch 9.16-S  9.16.0-S through versions before 9.16.27-S",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from Network and Information Security Lab, Tsinghua University and Changgen Zou from Qi An Xin Group Corp. for discovering and reporting this issue.",
            },
         ],
         datePublic: "2022-03-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "When using forwarders, bogus NS records supplied by, or via, those forwarders may be cached and used by named if it needs to recurse for any reason, causing it to obtain and pass on potentially incorrect answers. Some examples of configurations that will be vulnerable are:     Resolvers using per zone or global forwarding with forward first (forward first is the default).     Resolvers not using global forwarding, but with per-zone forwarding with either forward first (the default) or forward only.     Resolvers configured with global forwarding along with zone statements that disable forwarding for part of the DNS namespace. Authoritative-only BIND 9 servers are not vulnerable to this flaw. BIND     9.11.0 -> 9.11.36     9.12.0 -> 9.16.26     9.17.0 -> 9.18.0 BIND Supported Preview Editions:     9.11.4-S1 -> 9.11.36-S1     9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL.",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-23T00:00:00",
            orgId: "404fd4d2-a609-4245-b543-2c944a302a22",
            shortName: "isc",
         },
         references: [
            {
               url: "https://kb.isc.org/v1/docs/cve-2021-25220",
            },
            {
               name: "FEDORA-2022-14e36aac0c",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/",
            },
            {
               name: "FEDORA-2022-042d9c6146",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20220408-0001/",
            },
            {
               name: "FEDORA-2022-a88218de5c",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/",
            },
            {
               name: "FEDORA-2022-05918f0838",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/",
            },
            {
               name: "FEDORA-2022-3f293290c3",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
            },
            {
               name: "GLSA-202210-25",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.gentoo.org/glsa/202210-25",
            },
            {
               url: "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Upgrade to the patched release most closely related to your current version of BIND:\n    BIND 9.11.37\n    BIND 9.16.27\n    BIND 9.18.1\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n    BIND 9.11.37-S1\n    BIND 9.16.27-S1",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "DNS forwarders - cache poisoning vulnerability",
         workarounds: [
            {
               lang: "en",
               value: "If applicable, modify your configuration to either remove all forwarding or all possibility of recursion. Depending on your use-case, it may be possible to use other zone types to replace forward zones.\nActive exploits: We are not aware of any active exploits.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "404fd4d2-a609-4245-b543-2c944a302a22",
      assignerShortName: "isc",
      cveId: "CVE-2021-25220",
      datePublished: "2022-03-23T12:50:10.367480Z",
      dateReserved: "2021-01-15T00:00:00",
      dateUpdated: "2024-09-16T17:08:54.143Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36831
Vulnerability from cvelistv5
Published
2023-07-14 14:56
Modified
2024-11-07 14:41
Summary
An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. Service restoration is only possible by rebooting the system. The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations. Other products, platforms, and configurations are not affected by this vulnerability. This issue affects Juniper Networks Junos OS on SRX Series: 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R2-S1, 22.3R3; 22.4 versions prior to 22.4R1-S2, 22.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 22.2   < 22.2R3
Version: 22.3   < 22.3R2-S1, 22.3R3
Version: 22.4   < 22.4R1-S2, 22.4R2
Patch: unspecified
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.920Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA71636",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:juniper_networks:junos_os:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "junos_os",
                  vendor: "juniper_networks",
                  versions: [
                     {
                        lessThan: "22.2R3",
                        status: "affected",
                        version: "22.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.3R2-S1",
                        status: "affected",
                        version: "22.3",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.3R3",
                        status: "affected",
                        version: "22.3",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.4R1-S2",
                        status: "affected",
                        version: "22.4",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.4R2",
                        status: "affected",
                        version: "22.4",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.2R2",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36831",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-07T14:39:03.046485Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-07T14:41:49.644Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "22.2R3",
                     status: "affected",
                     version: "22.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.3R2-S1, 22.3R3",
                     status: "affected",
                     version: "22.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.4R1-S2, 22.4R2",
                     status: "affected",
                     version: "22.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.2R2",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following sample configuration options highlight the features required to be affected by this issue:<br><tt>&nbsp; set services ssl proxy profile SSL-PROXY protocol-version tls12-and-lower<br>&nbsp; set services ssl proxy profile SSL-PROXY trusted-ca all<br>&nbsp; set services ssl proxy profile SSL-PROXY root-ca ssl-proxy-ecdsa1<br>&nbsp; set security pki ca-profile SECURITY-CA-GROUP_1 ca-identity SECURITY-CA-GROUP_1<br></tt>...<br><tt>&nbsp; set security utm default-configuration web-filtering juniper-enhanced default log-and-permit<br>&nbsp; set security utm feature-profile web-filtering juniper-enhanced profile 2 category ... action block<br></tt>...<br><tt>&nbsp; set security utm utm-policy 1 web-filtering http-profile 2<br></tt>...<br><tt>&nbsp; set security policies from-zone private to-zone internet policy 1 then permit application-services ssl-proxy profile-name SSL-PROXY<br>&nbsp; set security policies from-zone private to-zone internet policy 1 then permit application-services utm-policy 1</tt><br>",
                  },
               ],
               value: "The following sample configuration options highlight the features required to be affected by this issue:\n  set services ssl proxy profile SSL-PROXY protocol-version tls12-and-lower\n  set services ssl proxy profile SSL-PROXY trusted-ca all\n  set services ssl proxy profile SSL-PROXY root-ca ssl-proxy-ecdsa1\n  set security pki ca-profile SECURITY-CA-GROUP_1 ca-identity SECURITY-CA-GROUP_1\n...\n  set security utm default-configuration web-filtering juniper-enhanced default log-and-permit\n  set security utm feature-profile web-filtering juniper-enhanced profile 2 category ... action block\n...\n  set security utm utm-policy 1 web-filtering http-profile 2\n...\n  set security policies from-zone private to-zone internet policy 1 then permit application-services ssl-proxy profile-name SSL-PROXY\n  set security policies from-zone private to-zone internet policy 1 then permit application-services utm-policy 1\n",
            },
         ],
         datePublic: "2023-07-12T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition.  Service restoration is only possible by rebooting the system.<br><br>The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations.  Other products, platforms, and configurations are not affected by this vulnerability.<br><br>This issue affects Juniper Networks Junos OS on SRX Series:<br>22.2 versions prior to 22.2R3;<br>22.3 versions prior to 22.3R2-S1, 22.3R3;<br>22.4 versions prior to 22.4R1-S2, 22.4R2.<br><br>This issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.<br>",
                  },
               ],
               value: "An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition.  Service restoration is only possible by rebooting the system.\n\nThe jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations.  Other products, platforms, and configurations are not affected by this vulnerability.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n22.2 versions prior to 22.2R3;\n22.3 versions prior to 22.3R2-S1, 22.3R3;\n22.4 versions prior to 22.4R1-S2, 22.4R2.\n\nThis issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-703",
                     description: "CWE-703 Improper Check or Handling of Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-14T14:56:32.306Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://supportportal.juniper.net/JSA71636",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: Junos OS 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2, 23.1R1, and all subsequent releases.<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: Junos OS 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2, 23.1R1, and all subsequent releases.\n",
            },
         ],
         source: {
            defect: [
               "1709031",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: jbuf memory leak when SSL Proxy and UTM Web-Filtering is applied",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no known workarounds for this issue.<br>",
                  },
               ],
               value: "There are no known workarounds for this issue.\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-36831",
      datePublished: "2023-07-14T14:56:32.306Z",
      dateReserved: "2023-06-27T16:17:25.275Z",
      dateUpdated: "2024-11-07T14:41:49.644Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-15504
Vulnerability from cvelistv5
Published
2018-08-18 00:00
Modified
2024-08-05 09:54
Severity ?
Summary
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T09:54:03.563Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/embedthis/appweb/issues/605",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/embedthis/goahead/issues/264",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/s/article/2019-07-Security-Bulletin-Junos-OS-J-Web-Denial-of-Service-due-to-multiple-vulnerabilities-in-Embedthis-Appweb-Server",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2018-08-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef",
            },
            {
               url: "https://github.com/embedthis/appweb/issues/605",
            },
            {
               url: "https://github.com/embedthis/goahead/issues/264",
            },
            {
               url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved",
            },
            {
               url: "https://supportportal.juniper.net/s/article/2019-07-Security-Bulletin-Junos-OS-J-Web-Denial-of-Service-due-to-multiple-vulnerabilities-in-Embedthis-Appweb-Server",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-15504",
      datePublished: "2018-08-18T00:00:00",
      dateReserved: "2018-08-17T00:00:00",
      dateUpdated: "2024-08-05T09:54:03.563Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22153
Vulnerability from cvelistv5
Published
2022-01-19 00:20
Modified
2024-09-17 01:50
Summary
An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.
References
https://kb.juniper.net/JSA11261x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 18.2R3
Version: 18.3   < 18.3R3
Version: 18.4   < 18.4R2-S9, 18.4R3
Version: 19.1   < 19.1R2
Version: 19.2   < 19.2R1-S1, 19.2R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.592Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11261",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series, MX Series with SPC3",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "18.2R3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.3R3",
                     status: "affected",
                     version: "18.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R2-S9, 18.4R3",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R2",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R1-S1, 19.2R2",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-01-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-407",
                     description: "CWE-407 Algorithmic Complexity",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-770",
                     description: "CWE-770 Allocation of Resources Without Limits or Throttling",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-19T00:20:54",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11261",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 18.2R3, 18.3R3, 18.4R2-S9, 18.4R3, 19.1R2, 19.2R1-S1, 19.2R2, 19.3R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11261",
            defect: [
               "1406465",
            ],
            discovery: "USER",
         },
         title: "SRX Series and MX Series with SPC3: A high percentage of fragments might lead to high latency or packet drops",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-01-12T17:00:00.000Z",
               ID: "CVE-2022-22153",
               STATE: "PUBLIC",
               TITLE: "SRX Series and MX Series with SPC3: A high percentage of fragments might lead to high latency or packet drops",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series, MX Series with SPC3",
                                          version_affected: "<",
                                          version_value: "18.2R3",
                                       },
                                       {
                                          platform: "SRX Series, MX Series with SPC3",
                                          version_affected: "<",
                                          version_name: "18.3",
                                          version_value: "18.3R3",
                                       },
                                       {
                                          platform: "SRX Series, MX Series with SPC3",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R2-S9, 18.4R3",
                                       },
                                       {
                                          platform: "SRX Series, MX Series with SPC3",
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R2",
                                       },
                                       {
                                          platform: "SRX Series, MX Series with SPC3",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R1-S1, 19.2R2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-407 Algorithmic Complexity",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-770 Allocation of Resources Without Limits or Throttling",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11261",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11261",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 18.2R3, 18.3R3, 18.4R2-S9, 18.4R3, 19.1R2, 19.2R1-S1, 19.2R2, 19.3R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11261",
               defect: [
                  "1406465",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22153",
      datePublished: "2022-01-19T00:20:54.857159Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-17T01:50:42.071Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28968
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2025-02-06 14:37
Summary
An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix <address/mask> extensive Session ID: <session ID>, Status: Normal, State: Active Policy name: <name of policy> Dynamic application: junos:UNKNOWN, <<<<< LOOK HERE Please note, the JDPI-Decoder and the AppID SigPack are both affected and both must be upgraded along with the operating system to address the matter. By default, none of this is auto-enabled for automatic updates. This issue affects: Juniper Networks any version of the JDPI-Decoder Engine prior to version 5.7.0-47 with the JDPI-Decoder enabled using any version of the AppID SigPack prior to version 1.550.2-31 (SigPack 3533) on Junos OS on SRX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2;
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.1R3-S10
Version: 19.2   < 19.2R3-S7
Version: 19.3   < 19.3R3-S8
Version: 19.4   < 19.4R3-S11
Version: 20.1R1   < 20.1*
Version: 20.2   < 20.2R3-S7
Version: 20.3R1   < 20.3*
Version: 20.4   < 20.4R3-S6
Version: 21.1   < 21.1R3-S5
Version: 21.2   < 21.2R3-S4
Version: 21.3   < 21.3R3-S3
Version: 21.4   < 21.4R3-S3
Version: 22.1   < 22.1R3-S1
Version: 22.2   < 22.2R2-S1, 22.2R3
Version: 22.3   < 22.3R2
Create a notification for this product.
   Juniper Networks AppID Service Sigpack Version: unspecified   < 1.550.2-31
Create a notification for this product.
   Juniper Networks JDPI-Decoder Engine Version: unspecified   < 5.7.0-47
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T13:51:38.825Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA70592",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-28968",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-06T14:37:20.686353Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-06T14:37:27.516Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: " Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.1R3-S10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R3-S7",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S8",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S11",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1*",
                     status: "affected",
                     version: "20.1R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S7",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3*",
                     status: "affected",
                     version: "20.3R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S6",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S5",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S4",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3-S3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R3-S3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R3-S1",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.2R2-S1, 22.2R3",
                     status: "affected",
                     version: "22.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.3R2",
                     status: "affected",
                     version: "22.3",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "SRX Series",
               ],
               product: "AppID Service Sigpack",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "1.550.2-31",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "SRX Series",
               ],
               product: "JDPI-Decoder Engine",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "5.7.0-47",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "\nFor this issue, Security Policy with dynamic application must be configured:\n \n  [security zones security-zone trust]\n  [security zones security-zone untrust]\n  [security policies from-zone “zone” to-zone “zone” policy “policy” match source-address “address”]\n  [security policies from-zone “zone” to-zone “zone” policy “policy” match destination-address “address”]\n  [security policies from-zone “zone” to-zone “zone” policy “policy” match dynamic-application “application”]\n  [security policies from-zone “zone” to-zone “zone” policy “policy” then “action”]",
            },
         ],
         datePublic: "2023-04-12T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix <address/mask> extensive Session ID: <session ID>, Status: Normal, State: Active Policy name: <name of policy> Dynamic application: junos:UNKNOWN, <<<<< LOOK HERE Please note, the JDPI-Decoder and the AppID SigPack are both affected and both must be upgraded along with the operating system to address the matter. By default, none of this is auto-enabled for automatic updates. This issue affects: Juniper Networks any version of the JDPI-Decoder Engine prior to version 5.7.0-47 with the JDPI-Decoder enabled using any version of the AppID SigPack prior to version 1.550.2-31 (SigPack 3533) on Junos OS on SRX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2;",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1325",
                     description: "CWE-1325: Improperly Controlled Sequential Memory Allocation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-17T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://supportportal.juniper.net/JSA70592",
            },
            {
               url: "https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf",
            },
            {
               url: "https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S11, 20.2R3-S7, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3-S3, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\nPlease note: Prior to Junos OS: 21.2R3-S4, 21.3R3-S3, 21.3R3-S3, 21.4R3-S3, 22.1R3-S1, 22.2R2-S1, 22.2R3, 22.3R2, 22.4R1, and all subsequent releases SOF is incorrectly offloading short-lived flows leading to early exhaustion of NP memory, reducing overall device performance.  Customers should review PRSearch PR1692100 for such details in conjunction with this advisory.\n\n\nCustomers may choose to enable automatic updates for IDP or manually update the IDP security package to receive the fixes. \n\nTo manually download the IDP signatures: \na. Download the IDP security-package on the device:\n  request security idp security-package download\nb. Check the status of the download:\n  request security idp security-package download status\nc. Install the IDP security-package on the device:\n  request security idp security-package install\nd. Check the status of the installation:\n  request security idp security-package install status\n\nTo enabled automatic update review the instuctions located at: https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX\n\n== When using AppID only:\n \n  request services application-identification download\n  request services application-identification download status\n  request services application-identification install\n  request services application-identification install status\n \nOr enable auto-update for AppID:\n \n  [edit]\n  user# set services application-identification download automatic ?\n  Possible completions:\n    interval             Attempt to download new application package (hours)\n    start-time           Start time(MM-DD.hh:mm / YYYY-MM-DD.hh:mm:ss)\n \nNote: This updated signature package is not compatible with v4 engines.\n\n\n",
            },
         ],
         source: {
            advisory: "JSA70592",
            defect: [
               "1694222",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: Policies that rely on JDPI-Decoder actions may fail open",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue other than disabling the AppID service.\n\nAdditionally, a reboot will temporarily clear the problem until such time that updates can be taken. How long this lasts depends on the customer's network environment and the device being affected.\n\n\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-28968",
      datePublished: "2023-04-17T00:00:00.000Z",
      dateReserved: "2023-03-29T00:00:00.000Z",
      dateUpdated: "2025-02-06T14:37:27.516Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22206
Vulnerability from cvelistv5
Published
2022-07-20 14:13
Modified
2024-09-16 18:08
Summary
A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.
References
https://kb.juniper.net/JSA69710x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 20.2   < 20.2R3-S4
Version: 20.3   < 20.3R3-S3
Version: 20.4   < 20.4R3-S3
Version: 21.1   < 21.1R3-S1
Version: 21.2   < 21.2R2-S2, 21.2R3
Version: 21.3   < 21.3R2
Version: 21.4   < 21.4R2
Create a notification for this product.
   Juniper Networks Junos OS Patch: unspecified
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.113Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69710",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.2R3-S4",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S3",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S1",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2-S2, 21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.2R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-120",
                     description: "CWE-120 Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T14:13:41",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69710",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R2-S2, 21.2R3, 21.3R2, 21.4R2, 22.1R1, and all subsequent releases.\n\nNote: Only those releases listed in the PROBLEM section above are affected. This fix has also been proactively committed into other releases that are not vulnerable to this issue.",
            },
         ],
         source: {
            advisory: "JSA69710",
            defect: [
               "1594638",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search",
         workarounds: [
            {
               lang: "en",
               value: "Disable UTM EWF safe-search by adding the no-safe-search config. Example:\n  set security utm default-configuration web-filtering juniper-enhanced no-safe-search \n  set security utm feature-profile web-filtering juniper-enhanced profile test-profile no-safe-search",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-07-13T16:00:00.000Z",
               ID: "CVE-2022-22206",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S4",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2-S2, 21.2R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.3",
                                          version_value: "21.3R2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.4",
                                          version_value: "21.4R2",
                                       },
                                       {
                                          version_affected: "!<",
                                          version_value: "20.2R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-120 Buffer Overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69710",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69710",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R2-S2, 21.2R3, 21.3R2, 21.4R2, 22.1R1, and all subsequent releases.\n\nNote: Only those releases listed in the PROBLEM section above are affected. This fix has also been proactively committed into other releases that are not vulnerable to this issue.",
               },
            ],
            source: {
               advisory: "JSA69710",
               defect: [
                  "1594638",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "Disable UTM EWF safe-search by adding the no-safe-search config. Example:\n  set security utm default-configuration web-filtering juniper-enhanced no-safe-search \n  set security utm feature-profile web-filtering juniper-enhanced profile test-profile no-safe-search",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22206",
      datePublished: "2022-07-20T14:13:41.390836Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T18:08:32.626Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22416
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-08 16:48
Summary
A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on SRX Series.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3-S5
Version: 21.1   < 21.1R3-S4
Version: 21.2   < 21.2R3-S2
Version: 21.3   < 21.3R3-S1
Version: 21.4   < 21.4R3
Version: 22.1   < 22.1R1-S2, 22.1R2
Version: 22.2   < 22.2R1-S1, 22.2R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.537Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70212",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22416",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-08T16:48:36.598429Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-08T16:48:51.747Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S5",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S4",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3-S1",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R1-S2, 22.1R2",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.2R1-S1, 22.2R2",
                     status: "affected",
                     version: "22.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration.\n\nPlease verify on SRX with:\n\n  user@host> show security alg status | match sip\n  SIP : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [services ... rule <rule-name> (term <term-name> ) from/match application/application-set <name>]\nwhere either\n  a. name = junos-sip\nor an application or application-set refers to SIP:\n  b. [applications application <name> application-protocol sip]\nor\n  c. [applications application-set <name> application junos-sip]",
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on SRX Series.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-120",
                     description: "CWE-120 Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70212",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S5, 21.1R3-S4, 21.2R3-S2, 21.3R3-S1, 21.4R3, 22.1R1-S2, 22.1R2, 22.2R1-S1, 22.2R2, 22.3R1, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA70212",
            defect: [
               "1668830",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash if SIP ALG is enabled and a malformed SIP packet is received",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22416",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-08T16:48:51.747Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-1285
Vulnerability from cvelistv5
Published
2016-03-09 23:00
Modified
2024-08-05 22:48
Severity ?
Summary
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
References
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlx_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.htmlvendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2016/dsa-3511vendor-advisory, x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.htmlvendor-advisory, x_refsource_SUSE
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.ascvendor-advisory, x_refsource_FREEBSD
https://kb.isc.org/article/AA-01438x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-2925-1vendor-advisory, x_refsource_UBUNTU
https://kb.isc.org/article/AA-01352x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlx_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2016-0562.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.htmlvendor-advisory, x_refsource_SUSE
https://security.gentoo.org/glsa/201610-07vendor-advisory, x_refsource_GENTOO
http://www.securitytracker.com/id/1035236vdb-entry, x_refsource_SECTRACK
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.htmlvendor-advisory, x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.htmlvendor-advisory, x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.htmlvendor-advisory, x_refsource_SUSE
http://marc.info/?l=bugtraq&m=146191105921542&w=2vendor-advisory, x_refsource_HP
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.htmlvendor-advisory, x_refsource_SUSE
https://kb.isc.org/article/AA-01380x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.htmlvendor-advisory, x_refsource_FEDORA
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.htmlvendor-advisory, x_refsource_FEDORA
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlx_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2016-0601.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=146191105921542&w=2vendor-advisory, x_refsource_HP
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.htmlvendor-advisory, x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.htmlvendor-advisory, x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.htmlvendor-advisory, x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.htmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2016-1285",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-23T17:28:36.470367Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-23T17:28:43.535Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T22:48:13.763Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
               },
               {
                  name: "FEDORA-2016-5047abe4a9",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
               },
               {
                  name: "DSA-3511",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2016/dsa-3511",
               },
               {
                  name: "SUSE-SU-2016:0780",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
               },
               {
                  name: "FreeBSD-SA-16:13",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/article/AA-01438",
               },
               {
                  name: "USN-2925-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2925-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/article/AA-01352",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
               },
               {
                  name: "RHSA-2016:0562",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
               },
               {
                  name: "openSUSE-SU-2016:0830",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
               },
               {
                  name: "GLSA-201610-07",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201610-07",
               },
               {
                  name: "1035236",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1035236",
               },
               {
                  name: "SUSE-SU-2016:1541",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
               },
               {
                  name: "FEDORA-2016-364c0a9df4",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
               },
               {
                  name: "openSUSE-SU-2016:0834",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
               },
               {
                  name: "HPSBUX03583",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
               },
               {
                  name: "SUSE-SU-2016:0759",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/article/AA-01380",
               },
               {
                  name: "FEDORA-2016-dce6dbe6a8",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
               },
               {
                  name: "FEDORA-2016-b593e84223",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
               },
               {
                  name: "SUSE-SU-2016:0825",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
               },
               {
                  name: "RHSA-2016:0601",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
               },
               {
                  name: "SSRT110084",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
               },
               {
                  name: "openSUSE-SU-2016:0859",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
               },
               {
                  name: "FEDORA-2016-161b73fc2c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
               },
               {
                  name: "openSUSE-SU-2016:0827",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
               },
               {
                  name: "FEDORA-2016-75f31fbb0a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-03-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-20T15:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
            },
            {
               name: "FEDORA-2016-5047abe4a9",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
            },
            {
               name: "DSA-3511",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2016/dsa-3511",
            },
            {
               name: "SUSE-SU-2016:0780",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
            },
            {
               name: "FreeBSD-SA-16:13",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/article/AA-01438",
            },
            {
               name: "USN-2925-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2925-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/article/AA-01352",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
            },
            {
               name: "RHSA-2016:0562",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
            },
            {
               name: "openSUSE-SU-2016:0830",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
            },
            {
               name: "GLSA-201610-07",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201610-07",
            },
            {
               name: "1035236",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1035236",
            },
            {
               name: "SUSE-SU-2016:1541",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
            },
            {
               name: "FEDORA-2016-364c0a9df4",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
            },
            {
               name: "openSUSE-SU-2016:0834",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
            },
            {
               name: "HPSBUX03583",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
            },
            {
               name: "SUSE-SU-2016:0759",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/article/AA-01380",
            },
            {
               name: "FEDORA-2016-dce6dbe6a8",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
            },
            {
               name: "FEDORA-2016-b593e84223",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
            },
            {
               name: "SUSE-SU-2016:0825",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
            },
            {
               name: "RHSA-2016:0601",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
            },
            {
               name: "SSRT110084",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
            },
            {
               name: "openSUSE-SU-2016:0859",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
            },
            {
               name: "FEDORA-2016-161b73fc2c",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
            },
            {
               name: "openSUSE-SU-2016:0827",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
            },
            {
               name: "FEDORA-2016-75f31fbb0a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-1285",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                  },
                  {
                     name: "FEDORA-2016-5047abe4a9",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
                  },
                  {
                     name: "DSA-3511",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2016/dsa-3511",
                  },
                  {
                     name: "SUSE-SU-2016:0780",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
                  },
                  {
                     name: "FreeBSD-SA-16:13",
                     refsource: "FREEBSD",
                     url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
                  },
                  {
                     name: "https://kb.isc.org/article/AA-01438",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/article/AA-01438",
                  },
                  {
                     name: "USN-2925-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2925-1",
                  },
                  {
                     name: "https://kb.isc.org/article/AA-01352",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/article/AA-01352",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                  },
                  {
                     name: "RHSA-2016:0562",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
                  },
                  {
                     name: "openSUSE-SU-2016:0830",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
                  },
                  {
                     name: "GLSA-201610-07",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201610-07",
                  },
                  {
                     name: "1035236",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1035236",
                  },
                  {
                     name: "SUSE-SU-2016:1541",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
                  },
                  {
                     name: "FEDORA-2016-364c0a9df4",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
                  },
                  {
                     name: "openSUSE-SU-2016:0834",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
                  },
                  {
                     name: "HPSBUX03583",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
                  },
                  {
                     name: "SUSE-SU-2016:0759",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
                  },
                  {
                     name: "https://kb.isc.org/article/AA-01380",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/article/AA-01380",
                  },
                  {
                     name: "FEDORA-2016-dce6dbe6a8",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
                  },
                  {
                     name: "FEDORA-2016-b593e84223",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
                     refsource: "CONFIRM",
                     url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
                  },
                  {
                     name: "SUSE-SU-2016:0825",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
                  },
                  {
                     name: "RHSA-2016:0601",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
                  },
                  {
                     name: "SSRT110084",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
                  },
                  {
                     name: "openSUSE-SU-2016:0859",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
                  },
                  {
                     name: "FEDORA-2016-161b73fc2c",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
                  },
                  {
                     name: "openSUSE-SU-2016:0827",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
                  },
                  {
                     name: "FEDORA-2016-75f31fbb0a",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-1285",
      datePublished: "2016-03-09T23:00:00",
      dateReserved: "2016-01-04T00:00:00",
      dateUpdated: "2024-08-05T22:48:13.763Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22415
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-07 19:54
Summary
An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all MX Series and SRX Series platform, when H.323 ALG is enabled and specific H.323 packets are received simultaneously, a flow processing daemon (flowd) crash will occur. Continued receipt of these specific packets will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.4R3-S10
Version: 20.2   < 20.2R3-S6
Version: 20.3   < 20.3R3-S6
Version: 20.4   < 20.4R3-S5
Version: 21.1   < 21.1R3-S4
Version: 21.2   < 21.2R3-S3
Version: 21.3   < 21.3R3-S3
Version: 21.4   < 21.4R3
Version: 22.1   < 22.1R2-S1, 22.1R3
Version: 22.2   < 22.2R1-S2, 22.2R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.541Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70211",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22415",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-07T19:54:09.137124Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-07T19:54:19.819Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.4R3-S10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S6",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S6",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S5",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S4",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3-S3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R2-S1, 22.1R3",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.2R1-S2, 22.2R2",
                     status: "affected",
                     version: "22.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the H.323 ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify with:\n\nCheck if H.323 ALG is enabled by default with:\n  user@host> show security alg status | match H323\n    H323      : Enabled\n\nConfigure H.323 ALG to receive incoming calls with following commands.\n  [set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24]\n  [set interfaces ge-0/0/1 unit 0 family inet address 172.16.1.1/24]\n  [set security zones security-zone private address-book address IP-Phone1 10.1.1.5/32]  \n  [set security zones security-zone private address-book address gatekeeper 10.1.1.25/32 ]\n  [set security zones security-zone private interfaces ge-0/0/0.0  ]\n  [set security zones security-zone public address-book address IP-Phone2 172.16.1.5/32 ]\n  [set security zones security-zone public interfaces ge-0/0/1.0]\n  [set security policies from-zone private to-zone public policy private-to-public match source-address IP-Phone1 ]\n  [set security policies from-zone private to-zone public policy private-to-public match source-address gatekeeper ]\n  [set security policies from-zone private to-zone public policy private-to-public match destination-address IP-Phone2 ]\n  [set security policies from-zone private to-zone public policy private-to-public match application junos-h323 ]\n  [set security policies from-zone private to-zone public policy private-to-public then permit ]\n  [set security policies from-zone public to-zone private policy public-to-private match source-address IP-Phone2 ]\n  [set security policies from-zone public to-zone private policy public-to-private match destination-address IP-Phone1 ]\n  [set security policies from-zone public to-zone private policy public-to-private match destination-address gatekeeper]\n  [set security policies from-zone public to-zone private policy public-to-private match application junos-h323 ]\n  [set security policies from-zone public to-zone private policy public-to-private then permit ]\n",
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all MX Series and SRX Series platform, when H.323 ALG is enabled and specific H.323 packets are received simultaneously, a flow processing daemon (flowd) crash will occur. Continued receipt of these specific packets will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "CWE-787 Out-of-bounds Write",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70211",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S10, 20.2R3-S6, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S3, 21.4R3, 22.1R2-S1, 22.1R3, 22.2R1-S2, 22.2R2, 22.3R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA70211",
            defect: [
               "1666996",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash when specific H.323 packets are received",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue, but it should be considered to disable the H.323 ALG if it's not strictly needed.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22415",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-07T19:54:19.819Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36846
Vulnerability from cvelistv5
Published
2023-08-17 19:18
Modified
2025-02-03 16:30
Summary
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
References
https://supportportal.juniper.net/JSA72300vendor-advisory, mitigation
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.1   
Version: 21.2   
Version: 21.3   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.701Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "mitigation",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA72300",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36846",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-11-15T16:40:41.113537Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-11-13",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-36846",
                     },
                     type: "kev",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-03T16:30:06.074Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.1*",
                     status: "affected",
                     version: "21.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R3-S6",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.3R3-S5",
                     status: "affected",
                     version: "21.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S5",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S3",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S2",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R2-S2, 22.3R3",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R2-S1, 22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: " \n\n\n\n\n\n\n\n<p>The following minimal configuration is necessary:</p><code>&nbsp; [system services web-management http]</code><p>or</p><code>&nbsp; [system services web-management https]</code><br>",
                  },
               ],
               value: " \n\n\n\n\n\n\n\nThe following minimal configuration is necessary:\n\n  [system services web-management http]or\n\n  [system services web-management https]\n",
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "LYS, working with DEVCORE Internship Program",
            },
         ],
         datePublic: "2023-08-17T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.<br><br>\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\n<span style=\"background-color: rgb(255, 255, 255);\">integrity</span>\n\nfor a certain&nbsp;\n\n<span style=\"background-color: rgb(255, 255, 255);\">part of the&nbsp;</span>file system, <span style=\"background-color: rgb(255, 255, 255);\">which may allow chaining to other vulnerabilities.</span>\n\n<br><p>This issue affects Juniper Networks Junos OS on SRX Series:</p><p></p><ul><li>All versions prior to 20.4R3-S8;</li><li>21.1 versions 21.1R1 and later;</li><li>21.2 versions prior to 21.2R3-S6;</li><li>21.3 versions \n\nprior to \n\n 21.3R3-S5;</li><li>21.4 versions \n\nprior to \n\n21.4R3-S5;</li><li>22.1 versions \n\nprior to \n\n22.1R3-S3;</li><li>22.2 versions \n\nprior to \n\n22.2R3-S2;</li><li>22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;</li><li>22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.</li></ul><p></p>",
                  },
               ],
               value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n  *  All versions prior to 20.4R3-S8;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S6;\n  *  21.3 versions \n\nprior to \n\n 21.3R3-S5;\n  *  21.4 versions \n\nprior to \n\n21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S3;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>",
                  },
               ],
               value: "\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-306",
                     description: "CWE-306 Missing Authentication for Critical Function",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-26T19:59:21.014Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
                  "mitigation",
               ],
               url: "https://supportportal.juniper.net/JSA72300",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: \n\n<span style=\"background-color: rgb(255, 255, 255);\">20.4R3-S8, 21.2R3-S6, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S3, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3*, 23.2R1</span>, and all subsequent releases.<br>*Pending Publication<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S8, 21.2R3-S6, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S3, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3*, 23.2R1, and all subsequent releases.\n*Pending Publication\n",
            },
         ],
         source: {
            defect: [
               "1735389",
            ],
            discovery: "EXTERNAL",
         },
         title: "Junos OS: SRX Series: A vulnerability in J-Web allows an unauthenticated attacker to upload arbitrary files",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n\n\n\n\nDisable J-Web, or limit access to only trusted hosts.<br>",
                  },
               ],
               value: "\n\n\n\n\nDisable J-Web, or limit access to only trusted hosts.\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-36846",
      datePublished: "2023-08-17T19:18:00.406Z",
      dateReserved: "2023-06-27T16:17:25.277Z",
      dateUpdated: "2025-02-03T16:30:06.074Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-28985
Vulnerability from cvelistv5
Published
2023-07-14 16:34
Modified
2024-11-07 14:28
Summary
An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition. On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core. This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598. In order to identify the current SigPack version, following command can be used: user@junos# show security idp security-package-version
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < SigPack 3598
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T13:51:39.183Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA71662",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:juniper_networks:junos_os:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "junos_os",
                  vendor: "juniper_networks",
                  versions: [
                     {
                        lessThan: "SigPack 3598",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-28985",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-07T14:25:45.770994Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-07T14:28:11.378Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
                  "MX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "SigPack 3598",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "For this issue to occur, IDP policy has to be enabled on the SRX and MX Series devices to inspect the HTTPS traffic.<br><br><tt>[ security idp active-policy policy-name ]<br>[ security idp idp-policy policy-name rulebase-ips rule rule-name ]</tt>",
                  },
               ],
               value: "For this issue to occur, IDP policy has to be enabled on the SRX and MX Series devices to inspect the HTTPS traffic.\n\n[ security idp active-policy policy-name ]\n[ security idp idp-policy policy-name rulebase-ips rule rule-name ]",
            },
         ],
         datePublic: "2023-07-12T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.<br><br>On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.<br><br>This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.<br><br>In order to identify the current SigPack version, following command can be used:<br><br><tt>user@junos# show security idp security-package-version</tt>",
                  },
               ],
               value: "An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.\n\nOn all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.\n\nThis issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.\n\nIn order to identify the current SigPack version, following command can be used:\n\nuser@junos# show security idp security-package-version",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1286",
                     description: "CWE-1286 Improper Validation of Syntactic Correctness of Input",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-14T16:34:24.993Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://supportportal.juniper.net/JSA71662",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: SigPack 3598, and all subsequent releases.<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: SigPack 3598, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA71662",
            defect: [
               "1655071",
            ],
            discovery: "USER",
         },
         title: "SRX Series and MX Series: An FPC core is observed when IDP is enabled on the device and a specific malformed SSL packet is received",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no known workarounds for this issue.<br>",
                  },
               ],
               value: "There are no known workarounds for this issue.\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-28985",
      datePublished: "2023-07-14T16:34:24.993Z",
      dateReserved: "2023-03-29T08:44:10.679Z",
      dateUpdated: "2024-11-07T14:28:11.378Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22412
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-07 15:32
Summary
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3-S4
Version: 21.1   < 21.1R3-S3
Version: 21.2   < 21.2R3-S2
Version: 21.3   < 21.3R3
Version: 21.4   < 21.4R3
Version: 22.1   < 22.1R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.654Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70208",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22412",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-07T14:55:39.637740Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-07T15:32:13.451Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S4",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R2",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration.\n\nPlease verify on SRX with:\n\n  user@host> show security alg status | match sip\n  SIP : Enabled\n\nPlease verify on MX with MS-MPC or MS-MIC whether the following is configured:\n\n  [services ... rule <rule-name> (term <term-name> ) from/match application/application-set <name>]\nwhere either\n  a. name = junos-sip\nor an application or application-set refers to SIP:\n  b. [applications application <name> application-protocol sip]\nor\n  c. [applications application-set <name> application junos-sip]",
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-667",
                     description: "CWE-667 Improper Locking",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70208",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA70208",
            defect: [
               "1645022",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash if the SIP ALG is enabled and specific SIP messages are processed",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22412",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-07T15:32:13.451Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36851
Vulnerability from cvelistv5
Published
2023-09-26 19:53
Modified
2025-02-03 16:30
Summary
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of integrity or confidentiality, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 21.2 versions prior to 21.2R3-S8; * 21.4 versions prior to 21.4R3-S6; * 22.1 versions prior to 22.1R3-S5; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S2; * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2.
References
https://supportportal.juniper.net/JSA72300vendor-advisory, mitigation
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 21.2   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Version: 23.2   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.845Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "mitigation",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA72300",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36851",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-11-15T16:40:42.428099Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-11-13",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-36851",
                     },
                     type: "kev",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-03T16:30:05.888Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.2R3-S8",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S6",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S5",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S3",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-S2",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R2-S2, 22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R1-S2, 23.2R2",
                     status: "affected",
                     version: "23.2",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: " \n\n\n\n\n\n\n\n<p>The following minimal configuration is necessary:</p><code>&nbsp; [system services web-management http]</code><p>or</p><code>&nbsp; [system services web-management https]</code><br>",
                  },
               ],
               value: " \n\n\n\n\n\n\n\nThe following minimal configuration is necessary:\n\n  [system services web-management http]or\n\n  [system services web-management https]\n",
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "The Juniper SIRT would like to acknowledge and thank watchtowr for responsibly reporting this vulnerability.",
            },
         ],
         datePublic: "2023-09-05T19:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.<br><br>\n\nWith a specific request to \n\n<span style=\"background-color: rgb(255, 255, 255);\">webauth_operation.php</span>\n\nthat doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of \n\n<span style=\"background-color: rgb(255, 255, 255);\">integrity</span>&nbsp;or confidentiality, <span style=\"background-color: rgb(255, 255, 255);\">which may allow chaining to other vulnerabilities.</span>\n\n<br><p>This issue affects Juniper Networks Junos OS on SRX Series:</p><p></p><ul><li>\n\n<span style=\"background-color: rgb(255, 255, 255);\">21.2 versions prior to 21.2R3-S8;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">21.4 \n\nversions prior to \n\n21.4R3-S6;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">22.1 \n\nversions prior to \n\n22.1R3-S5;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">22.2 \n\nversions prior to \n\n22.2R3-S3;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">22.3 \n\nversions prior to \n\n22.3R3-S2;</span></li><li>22.4 versions prior to 22,4R2-S2, 22.4R3;</li><li>23.2 versions prior to \n\n<span style=\"background-color: rgb(255, 255, 255);\">23.2R1-S2,&nbsp;</span>23.2R2.</li></ul>",
                  },
               ],
               value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to \n\nwebauth_operation.php\n\nthat doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of \n\nintegrity or confidentiality, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n  *  \n\n21.2 versions prior to 21.2R3-S8;\n  *  21.4 \n\nversions prior to \n\n21.4R3-S6;\n  *  22.1 \n\nversions prior to \n\n22.1R3-S5;\n  *  22.2 \n\nversions prior to \n\n22.2R3-S3;\n  *  22.3 \n\nversions prior to \n\n22.3R3-S2;\n  *  22.4 versions prior to 22,4R2-S2, 22.4R3;\n  *  23.2 versions prior to \n\n23.2R1-S2, 23.2R2.\n\n\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">While Juniper SIRT is not aware of a successful exploit against a customer, a proof of concept has been published and exploit attempts have been detected.</span>\n\n<br>",
                  },
               ],
               value: "\n\n\nWhile Juniper SIRT is not aware of a successful exploit against a customer, a proof of concept has been published and exploit attempts have been detected.\n\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-306",
                     description: "CWE-306 Missing Authentication for Critical Function",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-25T22:36:32.697Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
                  "mitigation",
               ],
               url: "https://supportportal.juniper.net/JSA72300",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue:&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.2R3-S8*, <span style=\"background-color: rgb(255, 255, 255);\">21.4R3-S6*, <span style=\"background-color: rgb(255, 255, 255);\">22.1R3-S5*</span>, <span style=\"background-color: rgb(255, 255, 255);\">22.2R3-S3*, <span style=\"background-color: rgb(255, 255, 255);\">22.3R3-S2*, </span></span></span></span><span style=\"background-color: rgb(255, 255, 255);\">22.4R2-S2, </span><span style=\"background-color: rgb(255, 255, 255);\">22.4R3*, </span><span style=\"background-color: rgb(255, 255, 255);\">23.2R1-S2, </span><span style=\"background-color: rgb(255, 255, 255);\">23.2R2*, </span><span style=\"background-color: rgb(255, 255, 255);\">23.4R1</span><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">,</span></span>&nbsp;and all subsequent releases.<br>*Pending Publication<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 21.2R3-S8*, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R2-S2, 22.4R3*, 23.2R1-S2, 23.2R2*, 23.4R1, and all subsequent releases.\n*Pending Publication\n",
            },
         ],
         source: {
            advisory: "JSA72300",
            defect: [
               "1758332",
            ],
            discovery: "EXTERNAL",
         },
         timeline: [
            {
               lang: "en",
               time: "2023-09-05T19:00:00.000Z",
               value: "Initial CVE publication",
            },
            {
               lang: "en",
               time: "2023-11-08T17:00:00.000Z",
               value: "Juniper SIRT is now aware of successful exploitation",
            },
         ],
         title: "Junos OS: SRX Series: A vulnerability in J-Web allows an unauthenticated attacker to upload and download arbitrary files",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n\n\n\n\nDisable J-Web, or limit access to only trusted hosts.<br>",
                  },
               ],
               value: "\n\n\n\n\nDisable J-Web, or limit access to only trusted hosts.\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-36851",
      datePublished: "2023-09-26T19:53:17.080Z",
      dateReserved: "2023-06-27T16:17:25.277Z",
      dateUpdated: "2025-02-03T16:30:05.888Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-1286
Vulnerability from cvelistv5
Published
2016-03-09 23:00
Modified
2024-08-05 22:48
Severity ?
Summary
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
References
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlx_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.htmlvendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2016/dsa-3511vendor-advisory, x_refsource_DEBIAN
http://www.securitytracker.com/id/1035237vdb-entry, x_refsource_SECTRACK
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.htmlvendor-advisory, x_refsource_SUSE
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.ascvendor-advisory, x_refsource_FREEBSD
https://kb.isc.org/article/AA-01438x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-2925-1vendor-advisory, x_refsource_UBUNTU
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlx_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2016-0562.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.htmlvendor-advisory, x_refsource_SUSE
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlx_refsource_CONFIRM
https://security.gentoo.org/glsa/201610-07vendor-advisory, x_refsource_GENTOO
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.htmlvendor-advisory, x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.htmlvendor-advisory, x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.htmlvendor-advisory, x_refsource_SUSE
http://marc.info/?l=bugtraq&m=146191105921542&w=2vendor-advisory, x_refsource_HP
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.htmlvendor-advisory, x_refsource_SUSE
https://kb.isc.org/article/AA-01380x_refsource_CONFIRM
https://kb.isc.org/article/AA-01353x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.htmlvendor-advisory, x_refsource_FEDORA
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.htmlvendor-advisory, x_refsource_FEDORA
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2016-0601.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=146191105921542&w=2vendor-advisory, x_refsource_HP
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.htmlvendor-advisory, x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.htmlvendor-advisory, x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.htmlvendor-advisory, x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.htmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T22:48:13.712Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
               },
               {
                  name: "FEDORA-2016-5047abe4a9",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
               },
               {
                  name: "DSA-3511",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2016/dsa-3511",
               },
               {
                  name: "1035237",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1035237",
               },
               {
                  name: "SUSE-SU-2016:0780",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
               },
               {
                  name: "FreeBSD-SA-16:13",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/article/AA-01438",
               },
               {
                  name: "USN-2925-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2925-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
               },
               {
                  name: "RHSA-2016:0562",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
               },
               {
                  name: "openSUSE-SU-2016:0830",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
               },
               {
                  name: "GLSA-201610-07",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201610-07",
               },
               {
                  name: "SUSE-SU-2016:1541",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
               },
               {
                  name: "FEDORA-2016-364c0a9df4",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
               },
               {
                  name: "openSUSE-SU-2016:0834",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
               },
               {
                  name: "HPSBUX03583",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
               },
               {
                  name: "SUSE-SU-2016:0759",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/article/AA-01380",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/article/AA-01353",
               },
               {
                  name: "FEDORA-2016-dce6dbe6a8",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
               },
               {
                  name: "FEDORA-2016-b593e84223",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
               },
               {
                  name: "SUSE-SU-2016:0825",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
               },
               {
                  name: "RHSA-2016:0601",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
               },
               {
                  name: "SSRT110084",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
               },
               {
                  name: "openSUSE-SU-2016:0859",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
               },
               {
                  name: "FEDORA-2016-161b73fc2c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
               },
               {
                  name: "openSUSE-SU-2016:0827",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
               },
               {
                  name: "FEDORA-2016-75f31fbb0a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-03-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-20T15:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
            },
            {
               name: "FEDORA-2016-5047abe4a9",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
            },
            {
               name: "DSA-3511",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2016/dsa-3511",
            },
            {
               name: "1035237",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1035237",
            },
            {
               name: "SUSE-SU-2016:0780",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
            },
            {
               name: "FreeBSD-SA-16:13",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/article/AA-01438",
            },
            {
               name: "USN-2925-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2925-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
            },
            {
               name: "RHSA-2016:0562",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
            },
            {
               name: "openSUSE-SU-2016:0830",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
            },
            {
               name: "GLSA-201610-07",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201610-07",
            },
            {
               name: "SUSE-SU-2016:1541",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
            },
            {
               name: "FEDORA-2016-364c0a9df4",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
            },
            {
               name: "openSUSE-SU-2016:0834",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
            },
            {
               name: "HPSBUX03583",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
            },
            {
               name: "SUSE-SU-2016:0759",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/article/AA-01380",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/article/AA-01353",
            },
            {
               name: "FEDORA-2016-dce6dbe6a8",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
            },
            {
               name: "FEDORA-2016-b593e84223",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
            },
            {
               name: "SUSE-SU-2016:0825",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
            },
            {
               name: "RHSA-2016:0601",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
            },
            {
               name: "SSRT110084",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
            },
            {
               name: "openSUSE-SU-2016:0859",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
            },
            {
               name: "FEDORA-2016-161b73fc2c",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
            },
            {
               name: "openSUSE-SU-2016:0827",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
            },
            {
               name: "FEDORA-2016-75f31fbb0a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-1286",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                  },
                  {
                     name: "FEDORA-2016-5047abe4a9",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
                  },
                  {
                     name: "DSA-3511",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2016/dsa-3511",
                  },
                  {
                     name: "1035237",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1035237",
                  },
                  {
                     name: "SUSE-SU-2016:0780",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
                  },
                  {
                     name: "FreeBSD-SA-16:13",
                     refsource: "FREEBSD",
                     url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
                  },
                  {
                     name: "https://kb.isc.org/article/AA-01438",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/article/AA-01438",
                  },
                  {
                     name: "USN-2925-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2925-1",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                  },
                  {
                     name: "RHSA-2016:0562",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
                  },
                  {
                     name: "openSUSE-SU-2016:0830",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                  },
                  {
                     name: "GLSA-201610-07",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201610-07",
                  },
                  {
                     name: "SUSE-SU-2016:1541",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
                  },
                  {
                     name: "FEDORA-2016-364c0a9df4",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
                  },
                  {
                     name: "openSUSE-SU-2016:0834",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
                  },
                  {
                     name: "HPSBUX03583",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
                  },
                  {
                     name: "SUSE-SU-2016:0759",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
                  },
                  {
                     name: "https://kb.isc.org/article/AA-01380",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/article/AA-01380",
                  },
                  {
                     name: "https://kb.isc.org/article/AA-01353",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/article/AA-01353",
                  },
                  {
                     name: "FEDORA-2016-dce6dbe6a8",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
                  },
                  {
                     name: "FEDORA-2016-b593e84223",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
                     refsource: "CONFIRM",
                     url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
                  },
                  {
                     name: "SUSE-SU-2016:0825",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
                  },
                  {
                     name: "RHSA-2016:0601",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
                  },
                  {
                     name: "SSRT110084",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
                  },
                  {
                     name: "openSUSE-SU-2016:0859",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
                  },
                  {
                     name: "FEDORA-2016-161b73fc2c",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
                  },
                  {
                     name: "openSUSE-SU-2016:0827",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
                  },
                  {
                     name: "FEDORA-2016-75f31fbb0a",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-1286",
      datePublished: "2016-03-09T23:00:00",
      dateReserved: "2016-01-04T00:00:00",
      dateUpdated: "2024-08-05T22:48:13.712Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-30391
Vulnerability from cvelistv5
Published
2024-04-12 15:25
Modified
2024-08-09 20:08
Summary
A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device. If a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed. This issue affects Junos OS: * All versions before 20.4R3-S7, * 21.1 versions before 21.1R3,  * 21.2 versions before 21.2R2-S1, 21.2R3,  * 21.3 versions before 21.3R1-S2, 21.3R2.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.1   
Version: 21.2   
Version: 21.3   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:32:07.096Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "http://supportportal.juniper.net/JSA79188",
               },
               {
                  tags: [
                     "technical-description",
                     "x_transferred",
                  ],
                  url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-30391",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-09T20:07:30.899427Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-09T20:08:44.052Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
                  "MX Series with SPC3",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S7",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R2-S1, 21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.3R1-S2, 21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "For a device to be affected IPsec must be configured with either&nbsp;hmac-sha-384 or hmac-sha-512 as follows:<br><br>&nbsp; [ security&nbsp;ipsec&nbsp;proposal &lt;proposal&gt; authentication-algorithm hmac-sha-384/hmac-sha-512 ]",
                  },
               ],
               value: "For a device to be affected IPsec must be configured with either hmac-sha-384 or hmac-sha-512 as follows:\n\n  [ security ipsec proposal <proposal> authentication-algorithm hmac-sha-384/hmac-sha-512 ]",
            },
         ],
         datePublic: "2024-04-10T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">SRX Series&nbsp;</span>allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device.<br><br>If a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed.<br><p>This issue affects Junos OS:</p><p></p><ul><li><span style=\"background-color: var(--wht);\">All versions before 20.4R3-S7,</span></li><li><span style=\"background-color: var(--wht);\">21.1 versions before 21.1R3,&nbsp;</span></li><li><span style=\"background-color: var(--wht);\">21.2 versions before 21.2R2-S1, 21.2R3,&nbsp;</span></li><li><span style=\"background-color: var(--wht);\">21.3 versions before 21.3R1-S2, 21.3R2.</span></li></ul><p></p>",
                  },
               ],
               value: "A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device.\n\nIf a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed.\nThis issue affects Junos OS:\n\n\n\n  *  All versions before 20.4R3-S7,\n  *  21.1 versions before 21.1R3, \n  *  21.2 versions before 21.2R2-S1, 21.2R3, \n  *  21.3 versions before 21.3R1-S2, 21.3R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 4.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "PRESENT",
                  attackVector: "NETWORK",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "NONE",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "LOW",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "LOW",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-306",
                     description: "CWE-306 Missing Authentication for Critical Function",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-16T20:24:44.347Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "http://supportportal.juniper.net/JSA79188",
            },
            {
               tags: [
                  "technical-description",
               ],
               url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S7, 21.1R3, 21.2R2-S1, 21.2R3, \n\n21.3R1-S2, 21.3R2, 21.4R1, and all subsequent releases.<br>\n\n<br><span style=\"background-color: rgb(255, 255, 255);\">Please note that for releases earlier than 21.1 the affected CLI options have been removed. For releases from 21.1 onwards the issue has been fixed.<br></span>\n\n<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S7, 21.1R3, 21.2R2-S1, 21.2R3, \n\n21.3R1-S2, 21.3R2, 21.4R1, and all subsequent releases.\n\n\n\nPlease note that for releases earlier than 21.1 the affected CLI options have been removed. For releases from 21.1 onwards the issue has been fixed.",
            },
         ],
         source: {
            advisory: "JSA79188",
            defect: [
               "1557177",
            ],
            discovery: "INTERNAL",
         },
         title: "Junos OS: MX Series with SPC3, and SRX Series: When IPsec authentication is configured with \"hmac-sha-384\" and \"hmac-sha-512\" no authentication of traffic is performed",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>There are no known workarounds for this issue.</p>",
                  },
               ],
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-30391",
      datePublished: "2024-04-12T15:25:24.733Z",
      dateReserved: "2024-03-26T23:06:17.994Z",
      dateUpdated: "2024-08-09T20:08:44.052Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-31364
Vulnerability from cvelistv5
Published
2021-10-19 18:16
Modified
2024-09-17 01:56
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, responsible for traffic forwarding in SRX, which will cause a Denial of Service (DoS). Continued receipt and processing of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue can only occur when specific packets are trying to create the same session and logging for session-close is configured as a policy action. Affected platforms are: SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2. Not affected platforms are: SRX4000 Series, SRX5000 Series with SPC3, and vSRX Series. This issue affects Juniper Networks Junos OS SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2: All versions prior to 17.4R3-S5; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2.
References
https://kb.juniper.net/JSA11226x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 17.4R3-S5
Version: 18.3   < 18.3R3-S5
Version: 18.4   < 18.4R3-S9
Version: 19.1   < 19.1R3-S6
Version: 19.2   < 19.2R1-S7, 19.2R3-S2
Version: 19.3   < 19.3R2-S6, 19.3R3-S2
Version: 19.4   < 19.4R1-S4, 19.4R3-S3
Version: 20.1   < 20.1R2-S2, 20.1R3
Version: 20.2   < 20.2R3
Version: 20.3   < 20.3R2-S1, 20.3R3
Version: 20.4   < 20.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:55:53.702Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11226",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "17.4R3-S5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.3R3-S5",
                     status: "affected",
                     version: "18.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R3-S9",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R3-S6",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R1-S7, 19.2R3-S2",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R2-S6, 19.3R3-S2",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R1-S4, 19.4R3-S3",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R2-S2, 20.1R3",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R2-S1, 20.3R3",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R2",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "This issue can only occur when logging for session-close is configured similar to the following example:\n\n  [security policies from-zone untrust to-zone trust policy policy_name then log session-close]",
            },
         ],
         datePublic: "2021-10-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, responsible for traffic forwarding in SRX, which will cause a Denial of Service (DoS). Continued receipt and processing of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue can only occur when specific packets are trying to create the same session and logging for session-close is configured as a policy action. Affected platforms are: SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2. Not affected platforms are: SRX4000 Series, SRX5000 Series with SPC3, and vSRX Series. This issue affects Juniper Networks Junos OS SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2: All versions prior to 17.4R3-S5; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-754",
                     description: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-362",
                     description: "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-19T18:16:52",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11226",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 17.4R3-S5, 18.3R3-S5, 18.4R3-S9, 19.1R3-S6, 19.2R1-S7, 19.2R3-S2, 19.3R2-S6, 19.3R3-S2, 19.4R1-S4, 19.4R3-S3, 20.1R2-S2, 20.1R3, 20.2R3, 20.3R2-S1, 20.3R3, 20.4R2, 21.1R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11226",
            defect: [
               "1571354",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: The flowd process will crash if log session-close is configured and specific traffic is received",
         workarounds: [
            {
               lang: "en",
               value: "Please remove the session-close log action from the policy actions of all policies.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2021-10-13T16:00:00.000Z",
               ID: "CVE-2021-31364",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX Series: The flowd process will crash if log session-close is configured and specific traffic is received",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_value: "17.4R3-S5",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "18.3",
                                          version_value: "18.3R3-S5",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R3-S9",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R3-S6",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R1-S7, 19.2R3-S2",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R2-S6, 19.3R3-S2",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R1-S4, 19.4R3-S3",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R2-S2, 20.1R3",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R2-S1, 20.3R3",
                                       },
                                       {
                                          platform: "SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "This issue can only occur when logging for session-close is configured similar to the following example:\n\n  [security policies from-zone untrust to-zone trust policy policy_name then log session-close]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, responsible for traffic forwarding in SRX, which will cause a Denial of Service (DoS). Continued receipt and processing of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue can only occur when specific packets are trying to create the same session and logging for session-close is configured as a policy action. Affected platforms are: SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2. Not affected platforms are: SRX4000 Series, SRX5000 Series with SPC3, and vSRX Series. This issue affects Juniper Networks Junos OS SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2: All versions prior to 17.4R3-S5; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11226",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11226",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 17.4R3-S5, 18.3R3-S5, 18.4R3-S9, 19.1R3-S6, 19.2R1-S7, 19.2R3-S2, 19.3R2-S6, 19.3R3-S2, 19.4R1-S4, 19.4R3-S3, 20.1R2-S2, 20.1R3, 20.2R3, 20.3R2-S1, 20.3R3, 20.4R2, 21.1R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11226",
               defect: [
                  "1571354",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "Please remove the session-close log action from the policy actions of all policies.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2021-31364",
      datePublished: "2021-10-19T18:16:52.279954Z",
      dateReserved: "2021-04-15T00:00:00",
      dateUpdated: "2024-09-17T01:56:30.666Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-9708
Vulnerability from cvelistv5
Published
2015-03-31 00:00
Modified
2024-08-06 13:55
Severity ?
Summary
Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:55:04.212Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1037007",
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1037007",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/embedthis/appweb/issues/413",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html",
               },
               {
                  name: "20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2015/Apr/19",
               },
               {
                  name: "20150328 Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/535028/100/0/threaded",
               },
               {
                  name: "73407",
                  tags: [
                     "vdb-entry",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/73407",
               },
               {
                  name: "20150328 Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2015/Mar/158",
               },
               {
                  name: "20150407 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2015/Apr/19",
               },
               {
                  name: "20150327 Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2015/Mar/158",
               },
               {
                  name: "[oss-security] 20150328 Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/03/28/2",
               },
               {
                  name: "20150328 Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threaded",
               },
               {
                  name: "[oss-security] 20150406 Re: Advisory: CVE-2014-9708: Appweb Web Server",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/04/06/2",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.paloaltonetworks.com/CVE-2014-9708",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-11-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by \"Range: x=,\".",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1037007",
               tags: [
                  "vdb-entry",
               ],
               url: "http://www.securitytracker.com/id/1037007",
            },
            {
               url: "https://github.com/embedthis/appweb/issues/413",
            },
            {
               url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
            },
            {
               url: "https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348",
            },
            {
               url: "http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html",
            },
            {
               name: "20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://seclists.org/fulldisclosure/2015/Apr/19",
            },
            {
               name: "20150328 Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.securityfocus.com/archive/1/535028/100/0/threaded",
            },
            {
               name: "73407",
               tags: [
                  "vdb-entry",
               ],
               url: "http://www.securityfocus.com/bid/73407",
            },
            {
               name: "20150328 Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://seclists.org/fulldisclosure/2015/Mar/158",
            },
            {
               name: "20150407 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://seclists.org/fulldisclosure/2015/Apr/19",
            },
            {
               name: "20150327 Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://seclists.org/fulldisclosure/2015/Mar/158",
            },
            {
               name: "[oss-security] 20150328 Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/03/28/2",
            },
            {
               name: "20150328 Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threaded",
            },
            {
               name: "[oss-security] 20150406 Re: Advisory: CVE-2014-9708: Appweb Web Server",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/04/06/2",
            },
            {
               url: "https://security.paloaltonetworks.com/CVE-2014-9708",
            },
            {
               url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-9708",
      datePublished: "2015-03-31T00:00:00",
      dateReserved: "2015-03-23T00:00:00",
      dateUpdated: "2024-08-06T13:55:04.212Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22167
Vulnerability from cvelistv5
Published
2022-01-19 00:21
Modified
2024-09-16 23:30
Summary
A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device. While JDPI correctly classifies out-of-state asymmetric TCP flows as the dynamic-application UNKNOWN, this classification is not provided to the policy module properly and hence traffic continues to use the pre-id-default-policy, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been denied. This issue only occurs when 'set security flow tcp-session no-syn-check' is configured on the device. This issue affects Juniper Networks Junos OS on SRX Series: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S8; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.
References
https://kb.juniper.net/JSA11265x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 18.4   < 18.4R2-S10, 18.4R3-S10
Version: 19.1   < 19.1R3-S8
Version: 19.2   < 19.2R1-S8, 19.2R3-S4
Version: 19.3   < 19.3R3-S3
Version: 19.4   < 19.4R3-S5
Version: 20.1   < 20.1R3-S1
Version: 20.2   < 20.2R3-S2
Version: 20.3   < 20.3R3-S1
Version: 20.4   < 20.4R2-S2, 20.4R3
Version: 21.1   < 21.1R2-S2, 21.1R3
Version: 21.2   < 21.2R2
Create a notification for this product.
   Juniper Networks Junos OS Patch: unspecified
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.035Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11265",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "18.4R2-S10, 18.4R3-S10",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R3-S8",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R1-S8, 19.2R3-S4",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S3",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S5",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R3-S1",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S2",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S1",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R2-S2, 20.4R3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2-S2, 21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "18.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "This issue is only seen when the following configuration is present: \n  [security flow tcp-session no-syn-check]",
            },
         ],
         datePublic: "2022-01-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device. While JDPI correctly classifies out-of-state asymmetric TCP flows as the dynamic-application UNKNOWN, this classification is not provided to the policy module properly and hence traffic continues to use the pre-id-default-policy, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been denied. This issue only occurs when 'set security flow tcp-session no-syn-check' is configured on the device. This issue affects Juniper Networks Junos OS on SRX Series: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S8; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-863",
                     description: "CWE-863 Incorrect Authorization",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-19T00:21:12",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11265",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R1-S8, 19.2R3-S4, 19.3R3-S3, 19.4R3-S5, 20.1R3-S1, 20.2R3-S2, 20.3R3-S1, 20.4R2-S2, 20.4R3, 21.1R2-S2, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11265",
            defect: [
               "1599053",
            ],
            discovery: "INTERNAL",
         },
         title: "Junos OS: SRX Series: If no-syn-check is enabled, traffic classified as UNKNOWN gets permitted by pre-id-default-policy",
         workarounds: [
            {
               lang: "en",
               value: "Any of the following workarounds will mitigate this issue:\n\n1. Remove 'security flow tcp-session no-syn-check' from the configuration.\n\n2: Enable AppID cache configuration:\n  set services application-identification application-system-cache security-services",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-01-12T17:00:00.000Z",
               ID: "CVE-2022-22167",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX Series: If no-syn-check is enabled, traffic classified as UNKNOWN gets permitted by pre-id-default-policy",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R2-S10, 18.4R3-S10",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R3-S8",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R1-S8, 19.2R3-S4",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R3-S5",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R2-S2, 20.4R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2-S2, 21.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2",
                                       },
                                       {
                                          version_affected: "!<",
                                          version_value: "18.4R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "This issue is only seen when the following configuration is present: \n  [security flow tcp-session no-syn-check]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device. While JDPI correctly classifies out-of-state asymmetric TCP flows as the dynamic-application UNKNOWN, this classification is not provided to the policy module properly and hence traffic continues to use the pre-id-default-policy, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been denied. This issue only occurs when 'set security flow tcp-session no-syn-check' is configured on the device. This issue affects Juniper Networks Junos OS on SRX Series: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S8; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-863 Incorrect Authorization",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11265",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11265",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R1-S8, 19.2R3-S4, 19.3R3-S3, 19.4R3-S5, 20.1R3-S1, 20.2R3-S2, 20.3R3-S1, 20.4R2-S2, 20.4R3, 21.1R2-S2, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11265",
               defect: [
                  "1599053",
               ],
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "Any of the following workarounds will mitigate this issue:\n\n1. Remove 'security flow tcp-session no-syn-check' from the configuration.\n\n2: Enable AppID cache configuration:\n  set services application-identification application-system-cache security-services",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22167",
      datePublished: "2022-01-19T00:21:12.979145Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T23:30:20.864Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36838
Vulnerability from cvelistv5
Published
2023-07-14 16:26
Modified
2024-10-22 14:31
Summary
An Out-of-bounds Read vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a local, authenticated attacker with low privileges, to cause a Denial of Service (DoS). If a low privileged user executes a specific CLI command, flowd which is responsible for traffic forwarding in SRX crashes and generates a core dump. This will cause temporary traffic interruption until the flowd process is restarted automatically. Continued execution of this command will lead to a sustained DoS. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S4; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R2; 22.4 versions prior to 22.4R1-S1, 22.4R2.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 20.2R3-S7
Version: 20.3   < 20.3*
Version: 20.4   < 20.4R3-S6
Version: 21.1   < 21.1R3-S5
Version: 21.2   < 21.2R3-S4
Version: 21.3   < 21.3R3-S4
Version: 21.4   < 21.4R3-S3
Version: 22.1   < 22.1R3-S1
Version: 22.2   < 22.2R3
Version: 22.3   < 22.3R2
Version: 22.4   < 22.4R1-S1, 22.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.599Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA71645",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36838",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T14:28:38.076785Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T14:31:56.652Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.2R3-S7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "20.3R1",
                           status: "affected",
                        },
                     ],
                     lessThan: "20.3*",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S6",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S5",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S4",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3-S4",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R3-S3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R3-S1",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.2R3",
                     status: "affected",
                     version: "22.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.3R2",
                     status: "affected",
                     version: "22.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.4R1-S1, 22.4R2",
                     status: "affected",
                     version: "22.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-12T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An Out-of-bounds Read vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a local, authenticated attacker with low privileges, to cause a Denial of Service (DoS).<br><br>If a low privileged user executes a specific CLI command, flowd which is responsible for traffic forwarding in SRX crashes and generates a core dump. This will cause temporary traffic interruption until the flowd process is restarted automatically. Continued execution of this command will lead to a sustained DoS.<br><br>This issue affects Juniper Networks Junos OS on SRX Series:<br>All versions prior to 20.2R3-S7;<br>20.3 version 20.3R1 and later versions;<br>20.4 versions prior to 20.4R3-S6;<br>21.1 versions prior to 21.1R3-S5;<br>21.2 versions prior to 21.2R3-S4;<br>21.3 versions prior to 21.3R3-S4;<br>21.4 versions prior to 21.4R3-S3;<br>22.1 versions prior to 22.1R3-S1;<br>22.2 versions prior to 22.2R3;<br>22.3 versions prior to 22.3R2;<br>22.4 versions prior to 22.4R1-S1, 22.4R2.<br>",
                  },
               ],
               value: "An Out-of-bounds Read vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a local, authenticated attacker with low privileges, to cause a Denial of Service (DoS).\n\nIf a low privileged user executes a specific CLI command, flowd which is responsible for traffic forwarding in SRX crashes and generates a core dump. This will cause temporary traffic interruption until the flowd process is restarted automatically. Continued execution of this command will lead to a sustained DoS.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\nAll versions prior to 20.2R3-S7;\n20.3 version 20.3R1 and later versions;\n20.4 versions prior to 20.4R3-S6;\n21.1 versions prior to 21.1R3-S5;\n21.2 versions prior to 21.2R3-S4;\n21.3 versions prior to 21.3R3-S4;\n21.4 versions prior to 21.4R3-S3;\n22.1 versions prior to 22.1R3-S1;\n22.2 versions prior to 22.2R3;\n22.3 versions prior to 22.3R2;\n22.4 versions prior to 22.4R1-S1, 22.4R2.\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125 Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-14T16:26:24.554Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://supportportal.juniper.net/JSA71645",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S7, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3-S4, 21.4R3-S3, 22.1R3-S1, 22.2R3, 22.3R2, 22.4R1-S1, 22.4R2, 23.1R1, and all subsequent releases.<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S7, 20.4R3-S6, 21.1R3-S5, 21.2R3-S4, 21.3R3-S4, 21.4R3-S3, 22.1R3-S1, 22.2R3, 22.3R2, 22.4R1-S1, 22.4R2, 23.1R1, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA71645",
            defect: [
               "1691594",
            ],
            discovery: "UNKNOWN",
         },
         title: "Junos OS: SRX Series: A flowd core occurs when running a low privileged CLI command",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no available workarounds for this issue.<br>",
                  },
               ],
               value: "There are no available workarounds for this issue.\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-36838",
      datePublished: "2023-07-14T16:26:24.554Z",
      dateReserved: "2023-06-27T16:17:25.276Z",
      dateUpdated: "2024-10-22T14:31:56.652Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22185
Vulnerability from cvelistv5
Published
2022-04-14 15:50
Modified
2024-09-16 22:20
Summary
A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated attacker to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwarding. Continued receipt and processing of this specific packet will create a sustained DoS condition. This issue only affects SRX Series when 'preserve-incoming-fragment-size' feature is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS prior to 17.3R1.
References
https://kb.juniper.net/JSA69493x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 18.3R3-S6
Patch: unspecified
Version: 17.3R1   < 17.3*
Version: 18.4   < 18.4R3-S10
Version: 19.1   < 19.1R3-S7
Version: 19.2   < 19.2R3-S4
Version: 19.3   < 19.3R3-S4
Version: 19.4   < 19.4R3-S6
Version: 20.1   < 20.1R3-S2
Version: 20.2   < 20.2R3-S3
Version: 20.3   < 20.3R3-S1
Version: 20.4   < 20.4R3
Version: 21.1   < 21.1R2-S1, 21.1R3
Version: 21.2   < 21.2R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.119Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69493",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "18.3R3-S6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.3R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.3*",
                     status: "affected",
                     version: "17.3R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R3-S10",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R3-S7",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R3-S4",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S4",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S6",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R3-S2",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S3",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S1",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2-S1, 21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "The config stanza affected by this issue:\n\n  [ security flow preserve-incoming-fragment-size ]",
            },
         ],
         datePublic: "2022-04-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated attacker to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwarding. Continued receipt and processing of this specific packet will create a sustained DoS condition. This issue only affects SRX Series when 'preserve-incoming-fragment-size' feature is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS prior to 17.3R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-754",
                     description: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-14T15:50:42",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69493",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 18.3R3-S6, 18.4R3-S10, 19.1R3-S7, 19.2R3-S4, 19.3R3-S4, 19.4R3-S6, 20.1R3-S2, 20.2R3-S3, 20.3R3-S1, 20.4R3, 21.1R2-S1, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69493",
            defect: [
               "1607782",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet",
         workarounds: [
            {
               lang: "en",
               value: "An administrator can disable the feature preserve-incoming-fragment-size to avoid this issue:\n\n  user@host# delete security flow preserve-incoming-fragment-size\n  user@host# commit",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-04-13T16:00:00.000Z",
               ID: "CVE-2022-22185",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: ">=",
                                          version_name: "17.3",
                                          version_value: "17.3R1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_value: "18.3R3-S6",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R3-S10",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R3-S7",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R3-S4",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R3-S4",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R3-S6",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R3-S2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2-S1, 21.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "!<",
                                          version_value: "17.3R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "The config stanza affected by this issue:\n\n  [ security flow preserve-incoming-fragment-size ]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated attacker to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwarding. Continued receipt and processing of this specific packet will create a sustained DoS condition. This issue only affects SRX Series when 'preserve-incoming-fragment-size' feature is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS prior to 17.3R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69493",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69493",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 18.3R3-S6, 18.4R3-S10, 19.1R3-S7, 19.2R3-S4, 19.3R3-S4, 19.4R3-S6, 20.1R3-S2, 20.2R3-S3, 20.3R3-S1, 20.4R3, 21.1R2-S1, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA69493",
               defect: [
                  "1607782",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An administrator can disable the feature preserve-incoming-fragment-size to avoid this issue:\n\n  user@host# delete security flow preserve-incoming-fragment-size\n  user@host# commit",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22185",
      datePublished: "2022-04-14T15:50:42.148265Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T22:20:45.803Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22411
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-07 15:32
Summary
An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On SRX Series devices using Unified Policies with IPv6, when a specific IPv6 packet goes through a dynamic-application filter which will generate an ICMP deny message, the flowd core is observed and the PFE is restarted. This issue affects: Juniper Networks Junos OS on SRX Series: 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 19.2   < 19.2R3-S6
Version: 19.3   < 19.3R3-S6
Version: 19.4   < 19.4R3-S9
Version: 20.2   < 20.2R3-S5
Version: 20.3   < 20.3R3-S4
Version: 20.4   < 20.4R3-S3
Version: 21.1   < 21.1R3
Version: 21.2   < 21.2R3
Version: 21.3   < 21.3R2
Version: 21.4   < 21.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.668Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70207",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22411",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-07T14:56:14.646968Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-07T15:32:39.451Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.2R3-S6",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S6",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S9",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S5",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S4",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "Security policy with dynamic-application Junos:QUIC (or similar applications) need to be configured for this issue to be present.\n\n  [set security zones security-zone trust]\n  [set security zones security-zone untrust]\n  [set security policies from-zone trust to-zone untrust policy p3 match source-address any]\n  [set security policies from-zone trust to-zone untrust policy p3 match destination-address any]\n  [set security policies from-zone trust to-zone untrust policy p3 match dynamic-application junos:QUIC]\n  [set security policies from-zone trust to-zone untrust policy p3 then permit]",
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On SRX Series devices using Unified Policies with IPv6, when a specific IPv6 packet goes through a dynamic-application filter which will generate an ICMP deny message, the flowd core is observed and the PFE is restarted. This issue affects: Juniper Networks Junos OS on SRX Series: 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "CWE-787 Out-of-bounds Write",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70207",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.2R3-S6, 19.3R3-S6, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3, 21.2R3, 21.3R2, 21.4R2, 22.1R1, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA70207",
            defect: [
               "1601806",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: The flow processing daemon (flowd) will crash when Unified Policies are used with IPv6 and certain dynamic applications are rejected by the device",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22411",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-07T15:32:39.451Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22221
Vulnerability from cvelistv5
Published
2022-07-20 14:15
Modified
2024-09-17 00:15
Summary
An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the "request ..." or "show system download ..." commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.
References
https://kb.juniper.net/JSA69725x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.1R3-S9
Version: 19.2   < 19.2R1-S9, 19.2R3-S5
Version: 19.3   < 19.3R3-S6
Version: 19.4   < 19.4R3-S8
Version: 20.1   < 20.1R3-S4
Version: 20.2   < 20.2R3-S4
Version: 20.3   < 20.3R3-S3
Version: 20.4   < 20.4R3-S2, 20.4R3-S3
Version: 21.1   < 21.1R3-S1
Version: 21.2   < 21.2R2-S2, 21.2R3
Version: 21.3   < 21.3R2, 21.3R3
Version: 21.4   < 21.4R1-S1, 21.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.150Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69725",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series, EX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.1R3-S9",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R1-S9, 19.2R3-S5",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S6",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S8",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R3-S4",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S4",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S3",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S2, 20.4R3-S3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S1",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2-S2, 21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2, 21.3R3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R1-S1, 21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the \"request ...\" or \"show system download ...\" commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "78",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T14:15:51",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69725",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 20.4R3-S3, 21.1R3-S1, 21.2R2-S2, 21.2R3, 21.3R2, 21.3R3, 21.4R1-S1, 21.4R2, 22.1R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69725",
            defect: [
               "1632136",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX and EX Series: Local privilege escalation flaw in \"download\" functionality",
         workarounds: [
            {
               lang: "en",
               value: "A workaround would be to deny users access to the \"request system download ...\" and \"show system download ...\" CLI commands.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-07-13T07:00:00.000Z",
               ID: "CVE-2022-22221",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX and EX Series: Local privilege escalation flaw in \"download\" functionality",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_value: "19.1R3-S9",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R1-S9, 19.2R3-S5",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R3-S6",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R3-S8",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R3-S4",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S4",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R3-S3",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3-S2, 20.4R3-S3",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R3-S1",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2-S2, 21.2R3",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "21.3",
                                          version_value: "21.3R2, 21.3R3",
                                       },
                                       {
                                          platform: "SRX Series, EX Series",
                                          version_affected: "<",
                                          version_name: "21.4",
                                          version_value: "21.4R1-S1, 21.4R2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the \"request ...\" or \"show system download ...\" commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "78",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69725",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69725",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 20.4R3-S3, 21.1R3-S1, 21.2R2-S2, 21.2R3, 21.3R2, 21.3R3, 21.4R1-S1, 21.4R2, 22.1R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA69725",
               defect: [
                  "1632136",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "A workaround would be to deny users access to the \"request system download ...\" and \"show system download ...\" CLI commands.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22221",
      datePublished: "2022-07-20T14:15:51.700129Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-17T00:15:46.928Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21620
Vulnerability from cvelistv5
Published
2024-01-25 22:50
Modified
2024-08-01 22:27
Summary
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2.
References
https://supportportal.juniper.net/JSA76390vendor-advisory
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.2   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Version: 23.2   
Version: 23.4   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:35.367Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA76390",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
                  "EX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S10",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R3-S8",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S6",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S5",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S3",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-S2",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R3-S1",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R2",
                     status: "affected",
                     version: "23.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.4R2",
                     status: "affected",
                     version: "23.4",
                     versionType: "semver",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "The Juniper SIRT would like to acknowledge and thank watchtowr for responsibly reporting this vulnerability.",
            },
         ],
         datePublic: "2024-01-25T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator.<br><br>A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives.<br><br>This issue affects Juniper Networks Junos OS on SRX Series and EX Series:<br><ul><li>All versions earlier than 20.4R3-S10;</li><li>21.2 versions earlier than 21.2R3-S8;</li><li>21.4 versions earlier than 21.4R3-S6;</li><li>22.1 versions earlier than 22.1R3-S5;</li><li>22.2 versions earlier than 22.2R3-S3;</li><li>22.3 versions earlier than 22.3R3-S2;</li><li>22.4 versions earlier than 22.4R3-S1;</li><li>23.2 versions earlier than 23.2R2;</li><li>23.4 versions earlier than 23.4R2.</li></ul>",
                  },
               ],
               value: "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator.\n\nA specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives.\n\nThis issue affects Juniper Networks Junos OS on SRX Series and EX Series:\n  *  All versions earlier than 20.4R3-S10;\n  *  21.2 versions earlier than 21.2R3-S8;\n  *  21.4 versions earlier than 21.4R3-S6;\n  *  22.1 versions earlier than 22.1R3-S5;\n  *  22.2 versions earlier than 22.2R3-S3;\n  *  22.3 versions earlier than 22.3R3-S2;\n  *  22.4 versions earlier than 22.4R3-S1;\n  *  23.2 versions earlier than 23.2R2;\n  *  23.4 versions earlier than 23.4R2.\n\n\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-25T22:51:36.390Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA76390",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The following software releases have been updated to resolve this specific issue: 20.4R3-S10*, 21.2R3-S8*, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R3-S1*, 23.2R2*, 23.4R2*, 24.2R1*, and all subsequent releases.</p><p>* Pending Publication</p>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S10*, 21.2R3-S8*, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R3-S1*, 23.2R2*, 23.4R2*, 24.2R1*, and all subsequent releases.\n\n* Pending Publication\n\n",
            },
         ],
         source: {
            defect: [
               "1779376",
            ],
            discovery: "EXTERNAL",
         },
         timeline: [
            {
               lang: "en",
               time: "2024-01-25T17:00:00.000Z",
               value: "Initial Publication",
            },
         ],
         title: "Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Disable J-Web, or limit access to only trusted hosts and users.</p>",
                  },
               ],
               value: "Disable J-Web, or limit access to only trusted hosts and users.\n\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-av217",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-21620",
      datePublished: "2024-01-25T22:50:18.164Z",
      dateReserved: "2023-12-27T19:38:25.710Z",
      dateUpdated: "2024-08-01T22:27:35.367Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22232
Vulnerability from cvelistv5
Published
2022-10-18 02:46
Modified
2024-09-17 03:18
Summary
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific transit traffic is processed the PFE will crash and restart. This issue affects Juniper Networks Junos OS: 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series; 22.1 versions prior to 22.1R1-S1, 22.1R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 21.4   < 21.4R1-S2, 21.4R2
Version: 22.1   < 22.1R1-S1, 22.1R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.938Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69886",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R1-S2, 21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R1-S1, 22.1R2",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "For a device to be affected the following configuration has to be present:\n\n  [security utm utm-policy <policy-name> content-filtering rule-set <rule-set-name>]",
            },
         ],
         datePublic: "2022-10-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific transit traffic is processed the PFE will crash and restart. This issue affects Juniper Networks Junos OS: 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series; 22.1 versions prior to 22.1R1-S1, 22.1R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476 NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-18T00:00:00",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA69886",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: Junos OS: 21.4R1-S2, 21.4R2, 22.1R1-S1 22.1R2, 22.2R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69886",
            defect: [
               "1657887",
            ],
            discovery: "INTERNAL",
         },
         title: "SRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific traffic is processed the PFE will crash",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22232",
      datePublished: "2022-10-18T02:46:34.119261Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-17T03:18:19.965Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22175
Vulnerability from cvelistv5
Published
2022-01-19 00:21
Modified
2024-09-16 20:02
Summary
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated networked attacker to cause a flowprocessing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can occur in a scenario where the SIP ALG is enabled and specific SIP messages are being processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
References
https://kb.juniper.net/JSA11281x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3-S1
Version: 21.1   < 21.1R2-S2, 21.1R3
Version: 21.2   < 21.2R1-S2, 21.2R2
Version: 21.3   < 21.3R1-S1, 21.3R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.855Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11281",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S1",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2-S2, 21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R1-S2, 21.2R2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R1-S1, 21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with:\n\n  user@host> show security alg status | match sip\n    SIP      : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [ ... services alg sip ]",
            },
         ],
         datePublic: "2022-01-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated networked attacker to cause a flowprocessing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can occur in a scenario where the SIP ALG is enabled and specific SIP messages are being processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-667",
                     description: "CWE-667 Improper Locking",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-19T00:21:24",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11281",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S1, 21.1R2-S2, 21.1R3, 21.2R1-S2, 21.2R2, 21.3R1-S1, 21.3R2, 21.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11281",
            defect: [
               "1604123",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX Series and SRX Series: The flowd daemon will crash if the SIP ALG is enabled and specific SIP messages are processed",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-01-12T17:00:00.000Z",
               ID: "CVE-2022-22175",
               STATE: "PUBLIC",
               TITLE: "Junos OS: MX Series and SRX Series: The flowd daemon will crash if the SIP ALG is enabled and specific SIP messages are processed",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3-S1",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2-S2, 21.1R3",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R1-S2, 21.2R2",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "21.3",
                                          version_value: "21.3R1-S1, 21.3R2",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "!<",
                                          version_value: "20.4R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with:\n\n  user@host> show security alg status | match sip\n    SIP      : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [ ... services alg sip ]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated networked attacker to cause a flowprocessing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can occur in a scenario where the SIP ALG is enabled and specific SIP messages are being processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-667 Improper Locking",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11281",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11281",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S1, 21.1R2-S2, 21.1R3, 21.2R1-S2, 21.2R2, 21.3R1-S1, 21.3R2, 21.4R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11281",
               defect: [
                  "1604123",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22175",
      datePublished: "2022-01-19T00:21:24.193997Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T20:02:47.465Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-39540
Vulnerability from cvelistv5
Published
2024-07-11 16:16
Modified
2024-08-02 04:26
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage. This issue affects Junos OS: 21.2 releases from 21.2R3-S5 before 21.2R3-S6. This issue does not affect earlier or later releases.
References
https://supportportal.juniper.net/JSA83000vendor-advisory
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 21.2R3-S5   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:juniper:junos:21.2:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "junos",
                  vendor: "juniper",
                  versions: [
                     {
                        lessThan: "21.2r3-s6",
                        status: "affected",
                        version: "21.2",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-39540",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-11T18:48:08.891704Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-11T18:52:47.153Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:26:16.011Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA83000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
                  "MX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.2R3-S6",
                     status: "affected",
                     version: "21.2R3-S5",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-07-10T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br><br>When an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.<br><br><p>This issue affects Junos OS:</p><p>21.2 releases from 21.2R3-S5 before 21.2R3-S6.</p><p>This issue does not affect earlier or later releases.</p>",
                  },
               ],
               value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.\n\nThis issue affects Junos OS:\n\n21.2 releases from 21.2R3-S5 before 21.2R3-S6.\n\nThis issue does not affect earlier or later releases.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 8.7,
                  baseSeverity: "HIGH",
                  privilegesRequired: "NONE",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "LOW",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "NONE",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-754",
                     description: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-07-11T16:16:37.977Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA83000",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: 21.2R3-S6.",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 21.2R3-S6.",
            },
         ],
         source: {
            advisory: "JSA83000",
            defect: [
               "1733627",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series, and MX Series with SPC3: Specific valid TCP traffic can cause a pfe crash",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no known workarounds for this issue.",
                  },
               ],
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-39540",
      datePublished: "2024-07-11T16:16:37.977Z",
      dateReserved: "2024-06-25T15:12:53.244Z",
      dateUpdated: "2024-08-02T04:26:16.011Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22178
Vulnerability from cvelistv5
Published
2022-01-19 00:21
Modified
2024-09-17 01:05
Summary
A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
References
https://kb.juniper.net/JSA11284x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3-S2
Version: 21.1   < 21.1R2-S1, 21.1R3
Version: 21.2   < 21.2R2
Version: 21.3   < 21.3R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.118Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11284",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S2",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2-S1, 21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with:\n\n  user@host> show security alg status | match sip\n    SIP      : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [ ... services alg sip ]",
            },
         ],
         datePublic: "2022-01-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-121",
                     description: "CWE-121 Stack-based Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-01-19T00:21:28",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11284",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S2, 21.1R2-S1, 21.1R3, 21.2R2, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11284",
            defect: [
               "1615438",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX and SRX series: Flowd core observed if the SIP ALG is enabled and a specific Session Initiation Protocol (SIP) packet is received",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-01-12T17:00:00.000Z",
               ID: "CVE-2022-22178",
               STATE: "PUBLIC",
               TITLE: "Junos OS: MX and SRX series: Flowd core observed if the SIP ALG is enabled and a specific Session Initiation Protocol (SIP) packet is received",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "MX Series, SRX series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3-S2",
                                       },
                                       {
                                          platform: "MX Series, SRX series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2-S1, 21.1R3",
                                       },
                                       {
                                          platform: "MX Series, SRX series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2",
                                       },
                                       {
                                          platform: "MX Series, SRX series",
                                          version_affected: "<",
                                          version_name: "21.3",
                                          version_value: "21.3R2",
                                       },
                                       {
                                          platform: "MX Series, SRX series",
                                          version_affected: "!<",
                                          version_value: "20.4R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with:\n\n  user@host> show security alg status | match sip\n    SIP      : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [ ... services alg sip ]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-121 Stack-based Buffer Overflow",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11284",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11284",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S2, 21.1R2-S1, 21.1R3, 21.2R2, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11284",
               defect: [
                  "1615438",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22178",
      datePublished: "2022-01-19T00:21:28.309624Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-17T01:05:59.860Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22236
Vulnerability from cvelistv5
Published
2022-10-18 02:46
Modified
2024-09-16 16:57
Summary
An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When specific valid SIP packets are received the PFE will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3-S4
Version: 21.1   < 21.1R3-S2
Version: 21.2   < 21.2R3-S2
Version: 21.3   < 21.3R2-S2, 21.3R3
Version: 21.4   < 21.4R1-S2, 21.4R2
Version: 22.1   < 22.1R1-S1, 22.1R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.874Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69892",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series, MX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S4",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S2",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2-S2, 21.3R3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R1-S2, 21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R1-S1, 22.1R2",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration.\n\nPlease verify on SRX with:\n\n  user@host> show security alg status | match sip\n  SIP : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [services ... rule <rule-name> (term <term-name> ) from/match application/application-set <name>]\nwhere either\n  a. name = junos-sip\nor an application or application-set refers to SIP:\n  b. [applications application <name> application-protocol sip]\nor\n  c. [applications application-set <name> application junos-sip]",
            },
         ],
         datePublic: "2022-10-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When specific valid SIP packets are received the PFE will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-824",
                     description: "CWE-824 Access of Uninitialized Pointer",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-18T00:00:00",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA69892",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69892",
            defect: [
               "1650755",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series and MX Series: When specific valid SIP packets are received the PFE will crash",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22236",
      datePublished: "2022-10-18T02:46:38.240146Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T16:57:49.688Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22235
Vulnerability from cvelistv5
Published
2022-10-18 02:46
Modified
2024-09-16 22:21
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based, attacker to cause Denial of Service (DoS). A PFE crash will happen when a GPRS Tunnel Protocol (GTP) packet is received with a malformed field in the IP header of GTP encapsulated General Packet Radio Services (GPRS) traffic. The packet needs to match existing state which is outside the attackers control, so the issue cannot be directly exploited. The issue will only be observed when endpoint address validation is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.2   < 20.2R3-S5
Version: 20.3   < 20.3R3-S4
Version: 20.4   < 20.4R3-S3
Version: 21.1   < 21.1R3-S2
Version: 21.2   < 21.2R3-S1
Version: 21.3   < 21.3R3
Version: 21.4   < 21.4R1-S2, 21.4R2
Version: 22.1   < 22.1R1-S1, 22.1R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.210Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69891",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.2R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S5",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S4",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S2",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S1",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R1-S2, 21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R1-S1, 22.1R2",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "A device can only be affected by this vulnerability if the following configuration is present:\n\n  [security gtp profile <profile> end-user-address-validated]",
            },
         ],
         datePublic: "2022-10-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based, attacker to cause Denial of Service (DoS). A PFE crash will happen when a GPRS Tunnel Protocol (GTP) packet is received with a malformed field in the IP header of GTP encapsulated General Packet Radio Services (GPRS) traffic. The packet needs to match existing state which is outside the attackers control, so the issue cannot be directly exploited. The issue will only be observed when endpoint address validation is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-754",
                     description: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-18T00:00:00",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA69891",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69891",
            defect: [
               "1634396",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed",
         workarounds: [
            {
               lang: "en",
               value: "This issue can be temporarily mitigated by disabling the end-point-address-validated security feature.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22235",
      datePublished: "2022-10-18T02:46:37.181379Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T22:21:08.750Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0211
Vulnerability from cvelistv5
Published
2021-01-15 17:35
Modified
2024-09-16 20:52
Severity ?
Summary
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.
References
https://kb.juniper.net/JSA11101x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 15.1   < 15.1R7-S8
Create a notification for this product.
   Juniper Networks Junos OS Version: 17.3   < 17.3R3-S10
Version: 17.4   < 17.4R2-S12, 17.4R3-S4
Version: 18.1   < 18.1R3-S12
Version: 18.2   < 18.2R2-S8, 18.2R3-S6
Version: 18.3   < 18.3R3-S4
Version: 18.4   < 18.4R1-S8, 18.4R2-S6, 18.4R3-S6
Version: 19.1   < 19.1R1-S6, 19.1R2-S2, 19.1R3-S3
Version: 19.2   < 19.2R3-S1
Version: 19.3   < 19.3R2-S5, 19.3R3-S1
Version: 19.4   < 19.4R1-S3, 19.4R2-S3, 19.4R3
Version: 20.1   < 20.1R2
Version: 20.2   < 20.2R1-S3 20.2R2
Version: 20.3   < 20.3R1-S1, 20.3R2
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X49   < 15.1X490-D240
Create a notification for this product.
   Juniper Networks Junos OS Evolved Version: unspecified   < 20.3R1-S1-EVO, 20.3R2-EVO
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:32:10.098Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11101",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "EX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "15.1R7-S8",
                     status: "affected",
                     version: "15.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "17.3R3-S10",
                     status: "affected",
                     version: "17.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.4R2-S12, 17.4R3-S4",
                     status: "affected",
                     version: "17.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.1R3-S12",
                     status: "affected",
                     version: "18.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.2R2-S8, 18.2R3-S6",
                     status: "affected",
                     version: "18.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.3R3-S4",
                     status: "affected",
                     version: "18.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R1-S8, 18.4R2-S6, 18.4R3-S6",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R1-S6, 19.1R2-S2, 19.1R3-S3",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R3-S1",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R2-S5, 19.3R3-S1",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R1-S3, 19.4R2-S3, 19.4R3",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R2",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R1-S3 20.2R2",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R1-S1, 20.3R2",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "15.1X490-D240",
                     status: "affected",
                     version: "15.1X49",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS Evolved",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.3R1-S1-EVO, 20.3R2-EVO",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "The following minimal configuration is required to potentially hit this issue:\n\n  protocols bgp family inet flow",
            },
         ],
         datePublic: "2021-01-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "NONE",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "754 - Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-15T17:35:57",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11101",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 15.1R7-S8, 15.1X49-D240, 17.3R3-S10, 17.4R2-S12, 17.4R3-S4, 18.1R3-S12, 18.2R2-S8, 18.2R3-S6, 18.3R3-S4, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R2-S2, 19.1R3-S3, 19.2R3-S1, 19.3R2-S5, 19.3R3-S1, 19.4R1-S3, 19.4R2-S3, 19.4R3, 20.1R2, 20.2R1-S3, 20.2R2, 20.3R1-S1, 20.3R2, 20.4R1, and all subsequent releases.\n\nJunos OS Evolved: 20.3R1-S1-EVO, 20.3R2-EVO, 20.4R1-EVO, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11101",
            defect: [
               "1539109",
            ],
            discovery: "USER",
         },
         title: "Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network traffic may be disrupted.",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2021-01-13T17:00:00.000Z",
               ID: "CVE-2021-0211",
               STATE: "PUBLIC",
               TITLE: "Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network traffic may be disrupted.",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "EX Series",
                                          version_affected: "<",
                                          version_name: "15.1",
                                          version_value: "15.1R7-S8",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "17.3",
                                          version_value: "17.3R3-S10",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "17.4",
                                          version_value: "17.4R2-S12, 17.4R3-S4",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "18.1",
                                          version_value: "18.1R3-S12",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "18.2",
                                          version_value: "18.2R2-S8, 18.2R3-S6",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "18.3",
                                          version_value: "18.3R3-S4",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R1-S8, 18.4R2-S6, 18.4R3-S6",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R1-S6, 19.1R2-S2, 19.1R3-S3",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R3-S1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R2-S5, 19.3R3-S1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R1-S3, 19.4R2-S3, 19.4R3",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R1-S3 20.2R2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R1-S1, 20.3R2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "15.1X49",
                                          version_value: "15.1X490-D240",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Junos OS Evolved",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "20.3R1-S1-EVO, 20.3R2-EVO",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "The following minimal configuration is required to potentially hit this issue:\n\n  protocols bgp family inet flow",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "NONE",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "754 - Improper Check for Unusual or Exceptional Conditions",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11101",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11101",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 15.1R7-S8, 15.1X49-D240, 17.3R3-S10, 17.4R2-S12, 17.4R3-S4, 18.1R3-S12, 18.2R2-S8, 18.2R3-S6, 18.3R3-S4, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R2-S2, 19.1R3-S3, 19.2R3-S1, 19.3R2-S5, 19.3R3-S1, 19.4R1-S3, 19.4R2-S3, 19.4R3, 20.1R2, 20.2R1-S3, 20.2R2, 20.3R1-S1, 20.3R2, 20.4R1, and all subsequent releases.\n\nJunos OS Evolved: 20.3R1-S1-EVO, 20.3R2-EVO, 20.4R1-EVO, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11101",
               defect: [
                  "1539109",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2021-0211",
      datePublished: "2021-01-15T17:35:57.520545Z",
      dateReserved: "2020-10-27T00:00:00",
      dateUpdated: "2024-09-16T20:52:46.854Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0230
Vulnerability from cvelistv5
Published
2021-04-22 19:36
Modified
2024-09-16 18:18
Summary
On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue affects Juniper Networks Junos OS on SRX Series: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3.
References
https://kb.juniper.net/JSA11125x_refsource_MISC
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 17.1R3   < 17.1*
Version: 17.3   < 17.3R3-S11
Version: 17.4   < 17.4R3-S5
Version: 18.2   < 18.2R3-S7, 18.2R3-S8
Version: 18.3   < 18.3R3-S4
Version: 18.4   < 18.4R2-S7, 18.4R3-S6
Version: 19.1   < 19.1R3-S4
Version: 19.2   < 19.2R1-S6
Version: 19.3   < 19.3R3-S1
Version: 19.4   < 19.4R3-S1
Version: 20.1   < 20.1R2, 20.1R3
Version: 20.2   < 20.2R2-S2, 20.2R3
Version: 20.3   < 20.3R1-S2, 20.3R2
Create a notification for this product.
   Juniper Networks Junos OS Patch: unspecified
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:32:10.204Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11125",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "17.1*",
                     status: "affected",
                     version: "17.1R3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.3R3-S11",
                     status: "affected",
                     version: "17.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.4R3-S5",
                     status: "affected",
                     version: "17.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.2R3-S7, 18.2R3-S8",
                     status: "affected",
                     version: "18.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.3R3-S4",
                     status: "affected",
                     version: "18.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R2-S7, 18.4R3-S6",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R3-S4",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R1-S6",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S1",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S1",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R2, 20.1R3",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R2-S2, 20.2R3",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R1-S2, 20.3R2",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "17.1R3",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "This issue affects SRX Series platforms with link aggregation configured:\n\n  [interfaces <interface ID> {gigether-options {802.3ad <aggregate interface ID>}}]",
            },
         ],
         datePublic: "2021-04-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue affects Juniper Networks Junos OS on SRX Series: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400 Uncontrolled Resource Consumption",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-24T11:01:15",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://kb.juniper.net/JSA11125",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 17.3R3-S11, 17.4R3-S5, 18.2R3-S7, 18.2R3-S8, 18.3R3-S4, 18.4R2-S7, 18.4R3-S6, 19.1R3-S4, 19.2R1-S6, 19.3R3-S1, 19.4R3-S1, 20.1R2, 20.1R3, 20.2R2-S2, 20.2R3, 20.3R1-S2, 20.3R2, 20.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11125",
            defect: [
               "1528605",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: Memory leak when querying Aggregated Ethernet (AE) interface statistics",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2021-04-14T16:00:00.000Z",
               ID: "CVE-2021-0230",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX Series: Memory leak when querying Aggregated Ethernet (AE) interface statistics",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: ">=",
                                          version_name: "17.1",
                                          version_value: "17.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "17.3",
                                          version_value: "17.3R3-S11",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "17.4",
                                          version_value: "17.4R3-S5",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.2",
                                          version_value: "18.2R3-S7, 18.2R3-S8",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.3",
                                          version_value: "18.3R3-S4",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R2-S7, 18.4R3-S6",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R3-S4",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R1-S6",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R2, 20.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R2-S2, 20.2R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R1-S2, 20.3R2",
                                       },
                                       {
                                          version_affected: "!<",
                                          version_value: "17.1R3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "This issue affects SRX Series platforms with link aggregation configured:\n\n  [interfaces <interface ID> {gigether-options {802.3ad <aggregate interface ID>}}]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue affects Juniper Networks Junos OS on SRX Series: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-400 Uncontrolled Resource Consumption",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11125",
                     refsource: "MISC",
                     url: "https://kb.juniper.net/JSA11125",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 17.3R3-S11, 17.4R3-S5, 18.2R3-S7, 18.2R3-S8, 18.3R3-S4, 18.4R2-S7, 18.4R3-S6, 19.1R3-S4, 19.2R1-S6, 19.3R3-S1, 19.4R3-S1, 20.1R2, 20.1R3, 20.2R2-S2, 20.2R3, 20.3R1-S2, 20.3R2, 20.4R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11125",
               defect: [
                  "1528605",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2021-0230",
      datePublished: "2021-04-22T19:36:59.287491Z",
      dateReserved: "2020-10-27T00:00:00",
      dateUpdated: "2024-09-16T18:18:01.023Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-39529
Vulnerability from cvelistv5
Published
2024-07-11 16:03
Modified
2024-08-02 04:26
Summary
A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service. This issue affects Junos OS: * All versions before 21.4R3-S6, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2.
References
https://supportportal.juniper.net/JSA82988vendor-advisory
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Version: 23.2   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "junos_os",
                  vendor: "juniper",
                  versions: [
                     {
                        lessThan: "21.4r3-s6",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.2r3-s3",
                        status: "affected",
                        version: "22.2",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.3r3-s3",
                        status: "affected",
                        version: "22.3",
                        versionType: "custom",
                     },
                     {
                        lessThan: "22.4r3",
                        status: "affected",
                        version: "22.4",
                        versionType: "custom",
                     },
                     {
                        lessThan: "23.2r2",
                        status: "affected",
                        version: "23.2",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-39529",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-11T18:27:00.817170Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-12T16:35:49.572Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:26:15.162Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA82988",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.4R3-S6",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S3",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-S3",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R2",
                     status: "affected",
                     version: "23.2",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "To be exposed to this issue at least one of DGA or tunnel detection needs to be configured:<br><br><tt>[ services security-metadata-streaming policy &lt;name&gt; dns detections dga ]<br>\n\n[ services security-metadata-streaming policy &lt;name&gt; dns detections tunneling ]</tt>\n\n<br><br>and DNS traceoptions have to be configured:<br><br><tt>[ services dns-filtering traceoptions ... ]</tt>",
                  },
               ],
               value: "To be exposed to this issue at least one of DGA or tunnel detection needs to be configured:\n\n[ services security-metadata-streaming policy <name> dns detections dga ]\n\n\n[ services security-metadata-streaming policy <name> dns detections tunneling ]\n\n\n\nand DNS traceoptions have to be configured:\n\n[ services dns-filtering traceoptions ... ]",
            },
         ],
         datePublic: "2024-07-10T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(255, 255, 255);\">A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Denial-of-Service (DoS).</span></span><br><br>\n\n<span style=\"background-color: rgb(255, 255, 255);\">If DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are <span style=\"background-color: rgb(255, 255, 255);\">configured, and specific valid transit DNS traffic is received this causes&nbsp;</span></span>a PFE crash and restart, leading to a Denial of Service.<br><br><span style=\"background-color: var(--wht);\">This issue affects Junos OS: <br><ul><li><span style=\"background-color: var(--wht);\">All versions before 21.4R3-S6,</span></li><li><span style=\"background-color: var(--wht);\">22.2 versions before 22.2R3-S3,</span></li><li><span style=\"background-color: var(--wht);\">22.3 versions before 22.3R3-S3,</span></li><li><span style=\"background-color: var(--wht);\">22.4 versions before 22.4R3,</span></li><li><span style=\"background-color: var(--wht);\">23.2 versions before 23.2R2.</span></li></ul></span>",
                  },
               ],
               value: "A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\n\n\nIf DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service.\n\nThis issue affects Junos OS: \n  *  All versions before 21.4R3-S6,\n  *  22.2 versions before 22.2R3-S3,\n  *  22.3 versions before 22.3R3-S3,\n  *  22.4 versions before 22.4R3,\n  *  23.2 versions before 23.2R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 8.7,
                  baseSeverity: "HIGH",
                  privilegesRequired: "NONE",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "LOW",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "NONE",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-134",
                     description: "CWE-134 Use of Externally-Controlled Format String",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-07-11T16:03:26.980Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA82988",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: 21.4R3-S6, 22.2R3-S3, 22.3R3-S3, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 21.4R3-S6, 22.2R3-S3, 22.3R3-S3, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA82988",
            defect: [
               "1755484",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no known workarounds for this issue.",
                  },
               ],
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-39529",
      datePublished: "2024-07-11T16:03:26.980Z",
      dateReserved: "2024-06-25T15:12:53.240Z",
      dateUpdated: "2024-08-02T04:26:15.162Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-3145
Vulnerability from cvelistv5
Published
2019-01-16 20:00
Modified
2024-09-17 00:10
Summary
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
Impacted products
Vendor Product Version
ISC BIND 9 Version: 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T14:16:28.228Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2018:0102",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0102",
               },
               {
                  name: "RHSA-2018:0487",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0487",
               },
               {
                  name: "DSA-4089",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2018/dsa-4089",
               },
               {
                  name: "RHSA-2018:0488",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0488",
               },
               {
                  name: "RHSA-2018:0101",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0101",
               },
               {
                  name: "1040195",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1040195",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.isc.org/docs/aa-01542",
               },
               {
                  name: "102716",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/102716",
               },
               {
                  name: "[debian-lts-announce] 20180121 [SECURITY] [DLA 1255-1] bind9 security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20180117-0003/",
               },
               {
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "BIND 9",
               vendor: "ISC",
               versions: [
                  {
                     status: "affected",
                     version: "9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "ISC would like to thank Jayachandran Palanisamy of Cygate AB for making us aware of this vulnerability.",
            },
         ],
         datePublic: "2018-01-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "While this bug has existed in BIND since 9.0.0, there are no known code paths leading to it in ISC releases prior to those containing the fix for CVE-2017-3137.  Thus while all instances of BIND ought to be patched, only ISC versions [9.9.9-P8 to 9.9.11, 9.10.4-P8 to 9.10.6, 9.11.0-P5 to 9.11.2, 9.9.9-S10 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, and 9.12.0a1 to 9.12.0rc1] acting as DNSSEC validating resolvers are currently known to crash due to this bug.  The known crash is an assertion failure in netaddr.c.",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-16T16:28:34.033Z",
            orgId: "404fd4d2-a609-4245-b543-2c944a302a22",
            shortName: "isc",
         },
         references: [
            {
               name: "RHSA-2018:0102",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:0102",
            },
            {
               name: "RHSA-2018:0487",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:0487",
            },
            {
               name: "DSA-4089",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2018/dsa-4089",
            },
            {
               name: "RHSA-2018:0488",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:0488",
            },
            {
               name: "RHSA-2018:0101",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:0101",
            },
            {
               name: "1040195",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1040195",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.isc.org/docs/aa-01542",
            },
            {
               name: "102716",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/102716",
            },
            {
               name: "[debian-lts-announce] 20180121 [SECURITY] [DLA 1255-1] bind9 security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20180117-0003/",
            },
            {
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONFIRM",
               ],
               url: "https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Upgrade to the patched release most closely related to your current version of BIND.  These can all be downloaded from http://www.isc.org/downloads.\n\n    BIND 9 version 9.9.11-P1\n    BIND 9 version 9.10.6-P1\n    BIND 9 version 9.11.2-P1\n    BIND 9 version 9.12.0rc2\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n    BIND 9 version 9.9.11-S2\n    BIND 9 version 9.10.6-S2",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Improper fetch cleanup sequencing in the resolver can cause named to crash",
         workarounds: [
            {
               lang: "en",
               value: "If an operator is experiencing crashes due to this, temporarily disabling DNSSEC validation can be used to avoid the known problematic code path while replacement builds are prepared.",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security-officer@isc.org",
               DATE_PUBLIC: "2018-01-16T00:00:00.000Z",
               ID: "CVE-2017-3145",
               STATE: "PUBLIC",
               TITLE: "Improper fetch cleanup sequencing in the resolver can cause named to crash",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "BIND 9",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "ISC",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "ISC would like to thank Jayachandran Palanisamy of Cygate AB for making us aware of this vulnerability.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "While this bug has existed in BIND since 9.0.0, there are no known code paths leading to it in ISC releases prior to those containing the fix for CVE-2017-3137.  Thus while all instances of BIND ought to be patched, only ISC versions [9.9.9-P8 to 9.9.11, 9.10.4-P8 to 9.10.6, 9.11.0-P5 to 9.11.2, 9.9.9-S10 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, and 9.12.0a1 to 9.12.0rc1] acting as DNSSEC validating resolvers are currently known to crash due to this bug.  The known crash is an assertion failure in netaddr.c.",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2018:0102",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:0102",
                  },
                  {
                     name: "RHSA-2018:0487",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:0487",
                  },
                  {
                     name: "DSA-4089",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2018/dsa-4089",
                  },
                  {
                     name: "RHSA-2018:0488",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:0488",
                  },
                  {
                     name: "RHSA-2018:0101",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:0101",
                  },
                  {
                     name: "1040195",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1040195",
                  },
                  {
                     name: "https://kb.isc.org/docs/aa-01542",
                     refsource: "CONFIRM",
                     url: "https://kb.isc.org/docs/aa-01542",
                  },
                  {
                     name: "102716",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/102716",
                  },
                  {
                     name: "[debian-lts-announce] 20180121 [SECURITY] [DLA 1255-1] bind9 security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20180117-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20180117-0003/",
                  },
                  {
                     name: "https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named",
                     refsource: "CONFIRM",
                     url: "https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "Upgrade to the patched release most closely related to your current version of BIND.  These can all be downloaded from http://www.isc.org/downloads.\n\n    BIND 9 version 9.9.11-P1\n    BIND 9 version 9.10.6-P1\n    BIND 9 version 9.11.2-P1\n    BIND 9 version 9.12.0rc2\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n    BIND 9 version 9.9.11-S2\n    BIND 9 version 9.10.6-S2",
               },
            ],
            source: {
               discovery: "UNKNOWN",
            },
            work_around: [
               {
                  lang: "en",
                  value: "If an operator is experiencing crashes due to this, temporarily disabling DNSSEC validation can be used to avoid the known problematic code path while replacement builds are prepared.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "404fd4d2-a609-4245-b543-2c944a302a22",
      assignerShortName: "isc",
      cveId: "CVE-2017-3145",
      datePublished: "2019-01-16T20:00:00Z",
      dateReserved: "2016-12-02T00:00:00",
      dateUpdated: "2024-09-17T00:10:46.349Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-31373
Vulnerability from cvelistv5
Published
2021-10-19 18:17
Modified
2024-09-16 18:34
Summary
A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensitive data and credentials from a web administration session, or hijack another user's active session to perform administrative actions. This issue affects: Juniper Networks Junos OS on SRX Series: 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3.
References
https://kb.juniper.net/JSA11238x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 18.2   < 18.2R3-S8
Version: 18.3   < 18.3R3-S5
Version: 18.4   < 18.4R3-S8
Version: 19.1   < 19.1R3-S5
Version: 19.2   < 19.2R1-S7, 19.2R3-S3
Version: 19.3   < 19.3R2-S6, 19.3R3-S3
Version: 19.4   < 19.4R1-S4, 19.4R2-S4, 19.4R3-S3
Version: 20.1   < 20.1R2-S2, 20.1R3
Version: 20.2   < 20.2R3-S1
Version: 20.3   < 20.3R2-S1, 20.3R3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T22:55:53.692Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11238",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "18.2R3-S8",
                     status: "affected",
                     version: "18.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.3R3-S5",
                     status: "affected",
                     version: "18.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R3-S8",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.1R3-S5",
                     status: "affected",
                     version: "19.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R1-S7, 19.2R3-S3",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R2-S6, 19.3R3-S3",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R1-S4, 19.4R2-S4, 19.4R3-S3",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R2-S2, 20.1R3",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S1",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R2-S1, 20.3R3",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "The examples of the config stanza affected by this issue:\n\n  [system services web-management]\n  [system services web-management https]",
            },
         ],
         datePublic: "2021-10-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensitive data and credentials from a web administration session, or hijack another user's active session to perform administrative actions. This issue affects: Juniper Networks Junos OS on SRX Series: 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20 Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Cross-site Scripting (XSS)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-19T18:17:08",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11238",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 18.2R3-S8, 18.3R3-S5, 18.4R3-S8, 19.1R3-S5, 19.2R1-S7, 19.2R3-S3, 19.3R2-S6, 19.3R3-S3, 19.4R1-S4, 19.4R2-S4, 19.4R3-S3, 20.1R2-S2, 20.1R3, 20.2R3-S1, 20.3R2-S1, 20.3R3, 20.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11238",
            defect: [
               "1460162",
            ],
            discovery: "INTERNAL",
         },
         title: "Junos OS: SRX Series: Persistent XSS vulnerability in J-Web",
         workarounds: [
            {
               lang: "en",
               value: "To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted administrative networks, hosts and users.\n\nAlternatively, J-Web can be disabled.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2021-10-13T16:00:00.000Z",
               ID: "CVE-2021-31373",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX Series: Persistent XSS vulnerability in J-Web",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.2",
                                          version_value: "18.2R3-S8",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.3",
                                          version_value: "18.3R3-S5",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R3-S8",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.1",
                                          version_value: "19.1R3-S5",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.2",
                                          version_value: "19.2R1-S7, 19.2R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.3",
                                          version_value: "19.3R2-S6, 19.3R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R1-S4, 19.4R2-S4, 19.4R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R2-S2, 20.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R2-S1, 20.3R3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "The examples of the config stanza affected by this issue:\n\n  [system services web-management]\n  [system services web-management https]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensitive data and credentials from a web administration session, or hijack another user's active session to perform administrative actions. This issue affects: Juniper Networks Junos OS on SRX Series: 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-20 Improper Input Validation",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-79 Cross-site Scripting (XSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11238",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11238",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 18.2R3-S8, 18.3R3-S5, 18.4R3-S8, 19.1R3-S5, 19.2R1-S7, 19.2R3-S3, 19.3R2-S6, 19.3R3-S3, 19.4R1-S4, 19.4R2-S4, 19.4R3-S3, 20.1R2-S2, 20.1R3, 20.2R3-S1, 20.3R2-S1, 20.3R3, 20.4R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11238",
               defect: [
                  "1460162",
               ],
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted administrative networks, hosts and users.\n\nAlternatively, J-Web can be disabled.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2021-31373",
      datePublished: "2021-10-19T18:17:09.036938Z",
      dateReserved: "2021-04-15T00:00:00",
      dateUpdated: "2024-09-16T18:34:02.417Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-0049
Vulnerability from cvelistv5
Published
2018-10-10 18:00
Modified
2024-09-17 01:01
Summary
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.
References
http://www.securityfocus.com/bid/105701vdb-entry, x_refsource_BID
https://kb.juniper.net/KB30092x_refsource_MISC
http://www.securitytracker.com/id/1041850vdb-entry, x_refsource_SECTRACK
https://kb.juniper.net/JSA10883x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 12.1X46-D76   < 12.1X46*
Version: 12.3X48-D66   < 12.3X48*
Version: 15.1X49-D131   < 15.1X49*
Create a notification for this product.
   Juniper Networks Junos OS Version: 12.3R12-S10
Version: 15.1R4-S9
Version: 15.1R6-S6
Version: 17.1R1-S7
Version: 17.2R1-S6
Version: 15.1F6-S10   < 15.1*
Version: 16.1R3-S8   < 16.1*
Version: 16.2R1-S6   < 16.2*
Version: 17.1R2-S7   < 17.1*
Version: 17.2R2-S4   < 17.2*
Version: 17.2X75-D100   < 17.2X75*
Version: 18.2X75-D5   < 18.2X75*
Create a notification for this product.
   Juniper Networks Junos OS Version: 14.1X53-D47
Create a notification for this product.
   Juniper Networks Junos OS Version: 14.1X53-D115   < 14.1X53*
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53-D233   < 15.1X53*
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53   <
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53-D67
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53-D59
Create a notification for this product.
   Juniper Networks Junos OS Version: 17.3R3
Version: 17.4R2
Version: 17.3R1-S4   < 17.3*
Version: 17.4R1-S3   < 17.4*
Version: 18.1R2   < 18.1*
Version: 18.2R1   < 18.2*
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T03:14:16.501Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "105701",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/105701",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/KB30092",
               },
               {
                  name: "1041850",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041850",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA10883",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "12.1X46-D81",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "12.1X46*",
                     status: "affected",
                     version: "12.1X46-D76",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "12.3X48-D75",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "12.3X48*",
                     status: "affected",
                     version: "12.3X48-D66",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "15.1X49-D150",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "15.1X49*",
                     status: "affected",
                     version: "15.1X49-D131",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "12.3R12-S10",
                  },
                  {
                     status: "affected",
                     version: "15.1R4-S9",
                  },
                  {
                     status: "affected",
                     version: "15.1R6-S6",
                  },
                  {
                     status: "affected",
                     version: "17.1R1-S7",
                  },
                  {
                     status: "affected",
                     version: "17.2R1-S6",
                  },
                  {
                     changes: [
                        {
                           at: "15.1R7",
                           status: "affected",
                        },
                        {
                           at: "15.1R7-S2",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "15.1*",
                     status: "affected",
                     version: "15.1F6-S10",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "16.1R4-S9",
                           status: "affected",
                        },
                        {
                           at: "16.1R4-S12",
                           status: "unaffected",
                        },
                        {
                           at: "16.1R5-S4",
                           status: "affected",
                        },
                        {
                           at: "16.1R6-S3",
                           status: "affected",
                        },
                        {
                           at: "16.1R6-S6",
                           status: "unaffected",
                        },
                        {
                           at: "16.1R7",
                           status: "affected",
                        },
                        {
                           at: "16.1R7-S2",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "16.1*",
                     status: "affected",
                     version: "16.1R3-S8",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "16.2R2-S5",
                           status: "affected",
                        },
                        {
                           at: "16.2R2-S7",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "16.2*",
                     status: "affected",
                     version: "16.2R1-S6",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "17.1R2-S9",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "17.1*",
                     status: "affected",
                     version: "17.1R2-S7",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "17.2R2-S6",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "17.2*",
                     status: "affected",
                     version: "17.2R2-S4",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "17.2X75-D101, 17.2X75-D110",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "17.2X75*",
                     status: "affected",
                     version: "17.2X75-D100",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "18.2X75-D20",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "18.2X75*",
                     status: "affected",
                     version: "18.2X75-D5",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "14.1X53-D47",
                  },
               ],
            },
            {
               platforms: [
                  "QFabric System",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "14.1X53-D130",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "14.1X53*",
                     status: "affected",
                     version: "14.1X53-D115",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "QFX5200/QFX5110",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "15.1X53-D235",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "15.1X53*",
                     status: "affected",
                     version: "15.1X53-D233",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "NFX150, NFX250",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "15.1X53-D590",
                           status: "unaffected",
                        },
                     ],
                     lessThanOrEqual: "15.1X53-D471",
                     status: "affected",
                     version: "15.1X53",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "QFX10000 Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "15.1X53-D67",
                  },
               ],
            },
            {
               platforms: [
                  "EX2300/EX3400",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "15.1X53-D59",
                  },
               ],
            },
            {
               platforms: [
                  "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "17.3R3",
                  },
                  {
                     status: "affected",
                     version: "17.4R2",
                  },
                  {
                     changes: [
                        {
                           at: "17.3R2-S2",
                           status: "affected",
                        },
                        {
                           at: "17.3R2-S4",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "17.3*",
                     status: "affected",
                     version: "17.3R1-S4",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "17.4R1-S5",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "17.4*",
                     status: "affected",
                     version: "17.4R1-S3",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "18.1R2-S3, 18.1R3",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "18.1*",
                     status: "affected",
                     version: "18.1R2",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "18.2R1-S2, 18.2R1-S3, 18.2R2",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "18.2*",
                     status: "affected",
                     version: "18.2R1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "The following minimal protocols configuration is required:\n\n  [protocols mpls interface]",
            },
         ],
         datePublic: "2018-10-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is aware of possible malicious network probing which may have triggered this issue, but not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NULL Pointer Dereference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-24T09:57:01",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               name: "105701",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/105701",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://kb.juniper.net/KB30092",
            },
            {
               name: "1041850",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041850",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA10883",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 12.1X46-D81, 12.3R12-S11, 12.3X48-D75, 14.1X53-D130, 14.1X53-D48, 15.1R7-S2, 15.1X49-D150, 5.1X53-D235, 15.1X53-D495, 15.1X53-D68, 15.1X53-D590, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.1X65-D48, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2X75-D101, 17.2X75-D110, 17.3R2-S4, 17.3R3-S1, 17.3R4, 17.4R1-S5, 17.4R2-S1, 17.4R3, 18.1R2-S3, 18.1R3, 18.2R1-S2, 18.2R1-S3, 18.2R2, 18.2X75-D20, 18.3R1, and all subsequent releases.\n\nAdditionally, the following software releases have been re-released to the Juniper download pages to resolve this specific issue:\n12.1X46-D76.1, 12.3X48-D70.4, 14.1X53-D47.6, 15.1F6-S10.11, 15.1R6-S6.2, 15.1R7.9, 15.1X49-D140.3, 15.1X53-D233.2, 15.1X53-D59.4, 15.1X53-D67.6, 16.1R6-S3.2, 16.1R7-S1.2, 16.1R7.8, 17.2X75-D100.6, 17.3R2-S2.2, 17.3R3.10, 17.4R1-S3.4, 18.1R2.6.\n\nNote: The final \".xy\" numeric entry, for example the .4 in 12.3X48-D70.4, on a release in this notice is the respin release number.  Customer's should check the respin release number on the version of Junos OS to confirm vulnerability.",
            },
         ],
         source: {
            advisory: "JSA10883",
            defect: [
               "1380862",
            ],
            discovery: "USER",
         },
         title: "Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash.",
         workarounds: [
            {
               lang: "en",
               value: "Remove MPLS configuration stanza from interfaces at risk.\nThere are no other available workarounds for this issue.",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2018-10-10T16:00:00.000Z",
               ID: "CVE-2018-0049",
               STATE: "PUBLIC",
               TITLE: "Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash.",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          affected: ">=",
                                          platform: "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "12.1X46",
                                          version_value: "12.1X46-D76",
                                       },
                                       {
                                          affected: "<",
                                          platform: "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "12.1X46",
                                          version_value: "12.1X46-D81",
                                       },
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "12.3",
                                          version_value: "12.3R12-S10",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "12.3X48",
                                          version_value: "12.3X48-D66",
                                       },
                                       {
                                          affected: "<",
                                          platform: "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "12.3X48",
                                          version_value: "12.3X48-D75",
                                       },
                                       {
                                          affected: "=",
                                          platform: "EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100",
                                          version_affected: "=",
                                          version_name: "14.1X53",
                                          version_value: "14.1X53-D47",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "QFabric System",
                                          version_affected: ">=",
                                          version_name: "14.1X53",
                                          version_value: "14.1X53-D115",
                                       },
                                       {
                                          affected: "<",
                                          platform: "QFabric System",
                                          version_affected: "<",
                                          version_name: "14.1X53",
                                          version_value: "14.1X53-D130",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "15.1",
                                          version_value: "15.1F6-S10",
                                       },
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "15.1",
                                          version_value: "15.1R4-S9",
                                       },
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "15.1",
                                          version_value: "15.1R6-S6",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "15.1",
                                          version_value: "15.1R7",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "15.1",
                                          version_value: "15.1R7-S2",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "15.1X49",
                                          version_value: "15.1X49-D131",
                                       },
                                       {
                                          affected: "<",
                                          platform: "SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "15.1X49",
                                          version_value: "15.1X49-D150",
                                       },
                                       {
                                          affected: ">",
                                          platform: "QFX5200/QFX5110",
                                          version_affected: ">",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D233",
                                       },
                                       {
                                          affected: "<",
                                          platform: "QFX5200/QFX5110",
                                          version_affected: "<",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D235",
                                       },
                                       {
                                          affected: "<=",
                                          platform: "NFX150, NFX250",
                                          version_affected: "<=",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D471",
                                       },
                                       {
                                          affected: "<",
                                          platform: "NFX150, NFX250",
                                          version_affected: "<",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D590",
                                       },
                                       {
                                          affected: "=",
                                          platform: "QFX10000 Series",
                                          version_affected: "=",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D67",
                                       },
                                       {
                                          affected: "=",
                                          platform: "EX2300/EX3400",
                                          version_affected: "=",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D59",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.1",
                                          version_value: "16.1R3-S8",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.1",
                                          version_value: "16.1R4-S9",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "16.1",
                                          version_value: "16.1R4-S12",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.1",
                                          version_value: "16.1R5-S4",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.1",
                                          version_value: "16.1R6-S3",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "16.1",
                                          version_value: "16.1R6-S6",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.1",
                                          version_value: "16.1R7",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "16.1",
                                          version_value: "16.1R7-S2",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.2",
                                          version_value: "16.2R1-S6",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "16.2",
                                          version_value: "16.2R2-S5",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "16.2",
                                          version_value: "16.2R2-S7",
                                       },
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "17.1",
                                          version_value: "17.1R1-S7",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "17.1",
                                          version_value: "17.1R2-S7",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.1",
                                          version_value: "17.1R2-S9",
                                       },
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "17.2",
                                          version_value: "17.2R1-S6",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "17.2",
                                          version_value: "17.2R2-S4",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.2",
                                          version_value: "17.2R2-S6",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "17.2X75",
                                          version_value: "17.2X75-D100",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.2X75",
                                          version_value: "17.2X75-D101, 17.2X75-D110",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "17.3",
                                          version_value: "17.3R1-S4",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "17.3",
                                          version_value: "17.3R2-S2",
                                       },
                                       {
                                          affected: "<",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "17.3",
                                          version_value: "17.3R2-S4",
                                       },
                                       {
                                          affected: "=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "=",
                                          version_name: "17.3",
                                          version_value: "17.3R3",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "17.4",
                                          version_value: "17.4R1-S3",
                                       },
                                       {
                                          affected: "<",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "17.4",
                                          version_value: "17.4R1-S5",
                                       },
                                       {
                                          affected: "=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "=",
                                          version_name: "17.4",
                                          version_value: "17.4R2",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "18.1",
                                          version_value: "18.1R2",
                                       },
                                       {
                                          affected: "<",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "18.1",
                                          version_value: "18.1R2-S3, 18.1R3",
                                       },
                                       {
                                          affected: ">=",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: ">=",
                                          version_name: "18.2",
                                          version_value: "18.2R1",
                                       },
                                       {
                                          affected: "<",
                                          platform: "All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX",
                                          version_affected: "<",
                                          version_name: "18.2",
                                          version_value: "18.2R1-S2, 18.2R1-S3, 18.2R2",
                                       },
                                       {
                                          affected: ">=",
                                          version_affected: ">=",
                                          version_name: "18.2X75",
                                          version_value: "18.2X75-D5",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "18.2X75",
                                          version_value: "18.2X75-D20",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "The following minimal protocols configuration is required:\n\n  [protocols mpls interface]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is aware of possible malicious network probing which may have triggered this issue, but not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NULL Pointer Dereference",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "105701",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/105701",
                  },
                  {
                     name: "https://kb.juniper.net/KB30092",
                     refsource: "MISC",
                     url: "https://kb.juniper.net/KB30092",
                  },
                  {
                     name: "1041850",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041850",
                  },
                  {
                     name: "https://kb.juniper.net/JSA10883",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA10883",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 12.1X46-D81, 12.3R12-S11, 12.3X48-D75, 14.1X53-D130, 14.1X53-D48, 15.1R7-S2, 15.1X49-D150, 5.1X53-D235, 15.1X53-D495, 15.1X53-D68, 15.1X53-D590, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.1X65-D48, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2X75-D101, 17.2X75-D110, 17.3R2-S4, 17.3R3-S1, 17.3R4, 17.4R1-S5, 17.4R2-S1, 17.4R3, 18.1R2-S3, 18.1R3, 18.2R1-S2, 18.2R1-S3, 18.2R2, 18.2X75-D20, 18.3R1, and all subsequent releases.\n\nAdditionally, the following software releases have been re-released to the Juniper download pages to resolve this specific issue:\n12.1X46-D76.1, 12.3X48-D70.4, 14.1X53-D47.6, 15.1F6-S10.11, 15.1R6-S6.2, 15.1R7.9, 15.1X49-D140.3, 15.1X53-D233.2, 15.1X53-D59.4, 15.1X53-D67.6, 16.1R6-S3.2, 16.1R7-S1.2, 16.1R7.8, 17.2X75-D100.6, 17.3R2-S2.2, 17.3R3.10, 17.4R1-S3.4, 18.1R2.6.\n\nNote: The final \".xy\" numeric entry, for example the .4 in 12.3X48-D70.4, on a release in this notice is the respin release number.  Customer's should check the respin release number on the version of Junos OS to confirm vulnerability.",
               },
            ],
            source: {
               advisory: "JSA10883",
               defect: [
                  "1380862",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "Remove MPLS configuration stanza from interfaces at risk.\nThere are no other available workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2018-0049",
      datePublished: "2018-10-10T18:00:00Z",
      dateReserved: "2017-11-16T00:00:00",
      dateUpdated: "2024-09-17T01:01:10.516Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22404
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-07 15:38
Summary
An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper Networks Junos OS on SRX series and MX with SPC3 allows an authenticated, network-based attacker to cause a Denial of Service (DoS). iked will crash and restart, and the tunnel will not come up when a peer sends a specifically formatted payload during the negotiation. This will impact other IKE negotiations happening at the same time. Continued receipt of this specifically formatted payload will lead to continuous crashing of iked and thereby the inability for any IKE negotiations to take place. Note that this payload is only processed after the authentication has successfully completed. So the issue can only be exploited by an attacker who can successfully authenticate. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.3R3-S7
Version: 19.4   < 19.4R3-S9
Version: 20.2   < 20.2R3-S5
Version: 20.3   < 20.3R3-S5
Version: 20.4   < 20.4R3-S4
Version: 21.1   < 21.1R3-S3
Version: 21.2   < 21.2R3-S2
Version: 21.3   < 21.3R3-S1
Version: 21.4   < 21.4R2-S1, 21.4R3
Version: 22.1   < 22.1R1-S2, 22.1R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.724Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70200",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22404",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-07T15:06:51.701123Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-07T15:38:46.011Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series MX Series with SPC3",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.3R3-S7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S9",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S5",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S5",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S4",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3-S1",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2-S1, 21.4R3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R1-S2, 22.1R2",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected by this issue IPsec VPN configuration needs to present similar to the following example:\n\n  [ security ike proposal <ike-proposal> ... ]\n  [ security ike policy <ike-policy> ... ] \n  [ security ike gateway <gateway-name> ... ]\n  [ security ipsec proposal <ipsec-proposal> ... ]\n  [ security ipsec policy <ipsec-policy> ... ]\n  [ security ipsec vpn <vpn-name> ike gateway <gateway-name> ]\n  [ security ipsec vpn <vpn-name> ike ipsec-policy <ipsec-policy> ]\n  [ security ipsec vpn <vpn-name> bind-interface <interface> ]\n\nand the system needs to run iked (vs. kmd which is not affected), which can be verified with:\n\n  show system processes extensive | match \"KMD|IKED\"",
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper Networks Junos OS on SRX series and MX with SPC3 allows an authenticated, network-based attacker to cause a Denial of Service (DoS). iked will crash and restart, and the tunnel will not come up when a peer sends a specifically formatted payload during the negotiation. This will impact other IKE negotiations happening at the same time. Continued receipt of this specifically formatted payload will lead to continuous crashing of iked and thereby the inability for any IKE negotiations to take place. Note that this payload is only processed after the authentication has successfully completed. So the issue can only be exploited by an attacker who can successfully authenticate. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "CWE-787 Out-of-bounds Write",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70200",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R2, 22.2R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA70200",
            defect: [
               "1665150",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series and MX Series with SPC3: When IPsec VPN is configured iked will core when a specifically formatted payload is received",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22404",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-07T15:38:46.011Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22204
Vulnerability from cvelistv5
Published
2022-07-20 14:12
Modified
2024-09-16 16:17
Summary
An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by "show security alg sip calls". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
References
https://kb.juniper.net/JSA69708x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3-S2
Version: 21.1   < 21.1R3-S2
Version: 21.2   < 21.2R2-S2
Version: 21.3   < 21.3R2
Version: 21.4   < 21.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.962Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69708",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series, MX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S2",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S2",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "21.2R3",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "21.2R2-S2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by \"show security alg sip calls\". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-401",
                     description: "CWE-401 Improper Release of Memory Before Removing Last Reference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T14:12:08",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69708",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S2, 21.1R3-S2, 21.2R2-S2, 21.2R3, 21.3R2, 21.4R2, 22.1R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69708",
            defect: [
               "1622455",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-07-13T16:00:00.000Z",
               ID: "CVE-2022-22204",
               STATE: "PUBLIC",
               TITLE: "Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3-S2",
                                       },
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R3-S2",
                                       },
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2-S2",
                                       },
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R3",
                                       },
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "<",
                                          version_name: "21.3",
                                          version_value: "21.3R2",
                                       },
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "<",
                                          version_name: "21.4",
                                          version_value: "21.4R2",
                                       },
                                       {
                                          platform: "SRX Series, MX Series",
                                          version_affected: "!<",
                                          version_value: "20.4R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by \"show security alg sip calls\". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-401 Improper Release of Memory Before Removing Last Reference",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69708",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69708",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S2, 21.1R3-S2, 21.2R2-S2, 21.2R3, 21.3R2, 21.4R2, 22.1R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA69708",
               defect: [
                  "1622455",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no known workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22204",
      datePublished: "2022-07-20T14:12:08.333040Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T16:17:32.073Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21609
Vulnerability from cvelistv5
Published
2024-04-12 14:55
Modified
2024-08-01 22:27
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the IKE daemon (iked) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an administratively adjacent attacker which is able to successfully establish IPsec tunnels to cause a Denial of Service (DoS). If specific values for the IPsec parameters local-ip, remote-ip, remote ike-id, and traffic selectors are sent from the peer, a memory leak occurs during every IPsec SA rekey which is carried out with a specific message sequence. This will eventually result in an iked process crash and restart. The iked process memory consumption can be checked using the below command:   user@host> show system processes extensive | grep iked           PID USERNAME   PRI NICE   SIZE   RES   STATE   C TIME WCPU COMMAND           56903 root       31   0     4016M 2543M CPU0   0 2:10 10.50% iked This issue affects Juniper Networks Junos OS: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S4; * 22.1 versions earlier than 22.1R3-S3; * 22.2 versions earlier than 22.2R3-S2; * 22.3 versions earlier than 22.3R3; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R1-S2, 23.2R2.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.2   
Version: 21.3   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Version: 23.2   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21609",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-17T17:18:38.989630Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-03T16:41:11.676Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:35.671Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "http://supportportal.juniper.net/JSA75750",
               },
               {
                  tags: [
                     "technical-description",
                     "x_transferred",
                  ],
                  url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "MX Series with SPC3",
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S9",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R3-S7",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.3R3-S5",
                     status: "affected",
                     version: "21.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S4",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S3",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S2",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R1-S2, 23.2R2",
                     status: "affected",
                     version: "23.2",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>To be exposed to this issue IPsec VPN needs to be configured with a minimal ike configuration:</p><p>&nbsp; [ security ike gateway ike-policy ]</p><p>&nbsp; [ security ipsec vpn ike gateway ]</p><p>and the system needs to run iked (vs. kmd which is not affected), which can be verified with:</p><p>&nbsp; show system processes extensive | match \"KMD|IKED\"</p>",
                  },
               ],
               value: "To be exposed to this issue IPsec VPN needs to be configured with a minimal ike configuration:\n\n  [ security ike gateway ike-policy ]\n\n  [ security ipsec vpn ike gateway ]\n\nand the system needs to run iked (vs. kmd which is not affected), which can be verified with:\n\n  show system processes extensive | match \"KMD|IKED\"",
            },
         ],
         datePublic: "2024-04-10T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Missing Release of Memory after Effective Lifetime vulnerability in the IKE daemon (iked) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an administratively adjacent attacker which is able to successfully establish IPsec tunnels to cause a Denial of Service (DoS).<br><br>If specific values for the IPsec parameters local-ip, remote-ip, remote ike-id, and traffic selectors are sent from the peer, a memory leak occurs during every IPsec SA rekey which is carried out with a specific message sequence. This will eventually result in an iked process crash and restart.<br><br>The iked process memory consumption can be checked using the below command:<br><tt>&nbsp; user@host&gt; show system processes extensive | grep iked<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  PID   USERNAME  &nbsp;  PRI  NICE  &nbsp; SIZE  &nbsp; RES  &nbsp; STATE  &nbsp; C   TIME  WCPU COMMAND<br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;  56903 root  &nbsp; &nbsp; &nbsp;  31  &nbsp; 0  &nbsp; &nbsp; 4016M  2543M   CPU0  &nbsp;  0   2:10  10.50% iked</tt><br><br>This issue affects Juniper Networks Junos OS:<br><ul><li>All versions earlier than 20.4R3-S9;</li><li>21.2 versions earlier than 21.2R3-S7;</li><li>21.3 versions earlier than 21.3R3-S5;</li><li>21.4 versions earlier than 21.4R3-S4;</li><li>22.1 versions earlier than 22.1R3-S3;</li><li>22.2 versions earlier than 22.2R3-S2;</li><li>22.3 versions earlier than 22.3R3;</li><li>22.4 versions earlier than 22.4R3;</li><li>23.2 versions earlier than 23.2R1-S2, 23.2R2.</li></ul>",
                  },
               ],
               value: "A Missing Release of Memory after Effective Lifetime vulnerability in the IKE daemon (iked) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an administratively adjacent attacker which is able to successfully establish IPsec tunnels to cause a Denial of Service (DoS).\n\nIf specific values for the IPsec parameters local-ip, remote-ip, remote ike-id, and traffic selectors are sent from the peer, a memory leak occurs during every IPsec SA rekey which is carried out with a specific message sequence. This will eventually result in an iked process crash and restart.\n\nThe iked process memory consumption can be checked using the below command:\n  user@host> show system processes extensive | grep iked\n           PID   USERNAME     PRI  NICE    SIZE    RES    STATE    C   TIME  WCPU COMMAND\n           56903 root         31    0      4016M  2543M   CPU0     0   2:10  10.50% iked\n\nThis issue affects Juniper Networks Junos OS:\n  *  All versions earlier than 20.4R3-S9;\n  *  21.2 versions earlier than 21.2R3-S7;\n  *  21.3 versions earlier than 21.3R3-S5;\n  *  21.4 versions earlier than 21.4R3-S4;\n  *  22.1 versions earlier than 22.1R3-S3;\n  *  22.2 versions earlier than 22.2R3-S2;\n  *  22.3 versions earlier than 22.3R3;\n  *  22.4 versions earlier than 22.4R3;\n  *  23.2 versions earlier than 23.2R1-S2, 23.2R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "NONE",
                  attackVector: "ADJACENT",
                  baseScore: 7.1,
                  baseSeverity: "HIGH",
                  privilegesRequired: "NONE",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "LOW",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "NONE",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-401",
                     description: "CWE-401 Missing Release of Memory after Effective Lifetime",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-16T20:09:32.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "http://supportportal.juniper.net/JSA75750",
            },
            {
               tags: [
                  "technical-description",
               ],
               url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The following software releases have been updated to resolve this specific issue: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S2, 22.3R3, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.</p>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S2, 22.3R3, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA75750",
            defect: [
               "1718199",
            ],
            discovery: "USER",
         },
         timeline: [
            {
               lang: "en",
               time: "2024-04-10T16:00:00.000Z",
               value: "Initial Publication",
            },
         ],
         title: "Junos OS: MX Series with SPC3, and SRX Series: If specific IPsec parameters are negotiated iked will crash due to a memory leak",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>While there is no workaround available, customers can monitor the memory utilization and restart iked periodically to clear the leak.</p>",
                  },
               ],
               value: "While there is no workaround available, customers can monitor the memory utilization and restart iked periodically to clear the leak.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-av217",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-21609",
      datePublished: "2024-04-12T14:55:00.663Z",
      dateReserved: "2023-12-27T19:38:25.708Z",
      dateUpdated: "2024-08-01T22:27:35.671Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21606
Vulnerability from cvelistv5
Published
2024-01-12 00:54
Modified
2024-08-01 22:27
Summary
A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In a remote access VPN scenario, if a "tcp-encap-profile" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed. This issue affects Juniper Networks Junos OS on SRX Series: * All versions earlier than 20.4R3-S8; * 21.2 versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S3; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.2   
Version: 21.3   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:35.875Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA75747",
               },
               {
                  tags: [
                     "technical-description",
                     "x_transferred",
                  ],
                  url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S8",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R3-S6",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.3R3-S5",
                     status: "affected",
                     version: "21.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S5",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S3",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S3",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-S1",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R2-S2, 22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>To be exposed to this issue the following configuration needs to be present:</p><code>  [security ike gateway &lt;gateway-name&gt; tcp-encap-profile &lt;profile-name&gt; ]</code><br/>",
                  },
               ],
               value: "To be exposed to this issue the following configuration needs to be present:\n\n  [security ike gateway <gateway-name> tcp-encap-profile <profile-name> ]\n",
            },
         ],
         datePublic: "2024-01-10T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<p>A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).</p><p>In a remote access VPN scenario, if a \"tcp-encap-profile\" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.</p><p>This issue affects Juniper Networks Junos OS on SRX Series:</p><p></p><ul><li>All versions earlier than 20.4R3-S8;</li><li>21.2 versions earlier than 21.2R3-S6;</li><li>21.3 versions earlier than 21.3R3-S5;</li><li>21.4 versions earlier than 21.4R3-S5;</li><li>22.1 versions earlier than 22.1R3-S3;</li><li>22.2 versions earlier than 22.2R3-S3;</li><li>22.3 versions earlier than 22.3R3-S1;</li><li>22.4 versions earlier than 22.4R2-S2, 22.4R3.</li></ul><p></p>\n\n",
                  },
               ],
               value: "\nA Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nIn a remote access VPN scenario, if a \"tcp-encap-profile\" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n  *  All versions earlier than 20.4R3-S8;\n  *  21.2 versions earlier than 21.2R3-S6;\n  *  21.3 versions earlier than 21.3R3-S5;\n  *  21.4 versions earlier than 21.4R3-S5;\n  *  22.1 versions earlier than 22.1R3-S3;\n  *  22.2 versions earlier than 22.2R3-S3;\n  *  22.3 versions earlier than 22.3R3-S1;\n  *  22.4 versions earlier than 22.4R2-S2, 22.4R3.\n\n\n\n\n\n\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-415",
                     description: "CWE-415 Double Free",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-12T00:54:51.832Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA75747",
            },
            {
               tags: [
                  "technical-description",
               ],
               url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S3, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases.</p>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S3, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases.\n\n",
            },
         ],
         source: {
            advisory: "JSA75747",
            defect: [
               "1721936",
            ],
            discovery: "USER",
         },
         timeline: [
            {
               lang: "en",
               time: "2024-01-10T17:00:00.000Z",
               value: "Initial Publication",
            },
         ],
         title: "Junos OS: SRX Series: When \"tcp-encap\" is configured and specific packets are received flowd will crash",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>There are no known workarounds for this issue.</p>",
                  },
               ],
               value: "There are no known workarounds for this issue.\n\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-av217",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-21606",
      datePublished: "2024-01-12T00:54:51.832Z",
      dateReserved: "2023-12-27T19:38:25.707Z",
      dateUpdated: "2024-08-01T22:27:35.875Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-5361
Vulnerability from cvelistv5
Published
2020-02-28 22:25
Modified
2024-09-16 16:39
Summary
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.​ Note that the ftps-extensions option is not enabled by default.
References
https://kb.juniper.net/JSA10706x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T06:41:09.297Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA10706",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-10-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.​ Note that the ftps-extensions option is not enabled by default.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-08-22T21:35:09",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA10706",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The overall behavior of the FTP ALG with the ftps-extensions option is intended behavior and will not change. The key component to this advisory is increasing user awareness of the wide TCP data channel (gate) creation, allowing creation of any new sessions from client to server, and potential implications where the SRX protects the FTPS server and the server/load-balancer allows the control channel to remain open for an extended period.\n\nInvestigation into the issue identified two issues applicable to environments where the SRX protects both FTPS clients and servers, as well as uses FTP and FTPS over the same TCP ports to different servers.\n\n​Due to the recent changes of OpenSSL, the FTP ALG without the ftps-extensions option may block FTPS commands over the FTP control channel. This is client and server specific, and was observed with FTPS clients that use recent versions of OpenSSL. This may result in security administrators enabling the ftps-extensions option with the intent of allowing the commands to pass, but inadvertently allowing wide gate creation. This was observed in a configuration with simultaneous FTPS client/server use, with use of the same ports for FTP and FTPS traffic.\n\nThe ftps-extension option is not supported when the SRX performs a destination NAT of the FTPS server, as the ALG cannot inspect the control channel to modify the server’s IP address signaled to the client. In an environment of simultaneous FTP and FTPS server use with the ftps-extensions option enabled, the gate is created but is generally unusable by the FTPS client. However, an FTPS client with knowledge of the server’s real IP address, its NAT’d IP address, and routing reachability to the server’s real IP address may be able to use the wide gate to reach the FTPS server.\nThe software releases listed below resolves these issues as follows:\n\nThe FTP ALG without the ftps-extensions option will allow FTPS related commands to pass over the FTP control channel. As the ftps-extension option is not enabled, the wide TCP data channel is not created.\n\nIf the FTPS server is NAT’d by the SRX (destination or static NAT), the wide TCP data channel is not created.",
            },
            {
               lang: "en",
               value: "The following software releases have been updated to resolve these specific issues: Junos OS 12.1X44-D55, 12.1X46-D40, 12.1X47-D25, 12.3X48-D15, 15.1X49-D10, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA10706",
            defect: [
               "1067419",
            ],
            discovery: "USER",
         },
         title: "Junos: FTPS through SRX opens up wide range of data channel TCP ports",
         workarounds: [
            {
               lang: "en",
               value: "Do not enable the 'ftps-extensions' option if FTPS is not needed.​ The 'ftps-extensions' option is disabled by default.​",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               DATE_PUBLIC: "2015-10-14T16:00:00.000Z",
               ID: "CVE-2015-5361",
               STATE: "PUBLIC",
               TITLE: "Junos: FTPS through SRX opens up wide range of data channel TCP ports",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.​ Note that the ftps-extensions option is not enabled by default.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA10706",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA10706",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The overall behavior of the FTP ALG with the ftps-extensions option is intended behavior and will not change. The key component to this advisory is increasing user awareness of the wide TCP data channel (gate) creation, allowing creation of any new sessions from client to server, and potential implications where the SRX protects the FTPS server and the server/load-balancer allows the control channel to remain open for an extended period.\n\nInvestigation into the issue identified two issues applicable to environments where the SRX protects both FTPS clients and servers, as well as uses FTP and FTPS over the same TCP ports to different servers.\n\n​Due to the recent changes of OpenSSL, the FTP ALG without the ftps-extensions option may block FTPS commands over the FTP control channel. This is client and server specific, and was observed with FTPS clients that use recent versions of OpenSSL. This may result in security administrators enabling the ftps-extensions option with the intent of allowing the commands to pass, but inadvertently allowing wide gate creation. This was observed in a configuration with simultaneous FTPS client/server use, with use of the same ports for FTP and FTPS traffic.\n\nThe ftps-extension option is not supported when the SRX performs a destination NAT of the FTPS server, as the ALG cannot inspect the control channel to modify the server’s IP address signaled to the client. In an environment of simultaneous FTP and FTPS server use with the ftps-extensions option enabled, the gate is created but is generally unusable by the FTPS client. However, an FTPS client with knowledge of the server’s real IP address, its NAT’d IP address, and routing reachability to the server’s real IP address may be able to use the wide gate to reach the FTPS server.\nThe software releases listed below resolves these issues as follows:\n\nThe FTP ALG without the ftps-extensions option will allow FTPS related commands to pass over the FTP control channel. As the ftps-extension option is not enabled, the wide TCP data channel is not created.\n\nIf the FTPS server is NAT’d by the SRX (destination or static NAT), the wide TCP data channel is not created.",
               },
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve these specific issues: Junos OS 12.1X44-D55, 12.1X46-D40, 12.1X47-D25, 12.3X48-D15, 15.1X49-D10, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA10706",
               defect: [
                  "1067419",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "Do not enable the 'ftps-extensions' option if FTPS is not needed.​ The 'ftps-extensions' option is disabled by default.​",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-5361",
      datePublished: "2020-02-28T22:25:24.967247Z",
      dateReserved: "2015-07-01T00:00:00",
      dateUpdated: "2024-09-16T16:39:13.197Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0289
Vulnerability from cvelistv5
Published
2021-07-15 20:01
Modified
2024-09-17 03:48
Summary
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.
References
https://kb.juniper.net/JSA11191x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 5.6R1   < 5.6*
Version: 15.1   < 15.1R7-S10
Version: 16.1R1   < 16.1*
Version: 16.2R1   < 16.2*
Version: 17.1R1   < 17.1*
Version: 17.2R1   < 17.2*
Version: 17.3R1   < 17.3*
Version: 17.4R1   < 17.4*
Version: 18.1R1   < 18.1*
Version: 18.2R1   < 18.2*
Version: 18.3R1   < 18.3*
Version: 18.4   < 18.4R2-S9, 18.4R3-S9
Version: 19.4   < 19.4R3-S3
Version: 20.1   < 20.1R3
Version: 20.2   < 20.2R3-S2
Version: 20.3R1   < 20.3*
Version: 20.4   < 20.4R3
Version: 21.1   < 21.1R2
Create a notification for this product.
   Juniper Networks Junos OS Version: 18.4   < 18.4R2-S9, 18.4R3-S9
Version: 19.4   < 19.4R3-S3
Version: 20.1   < 20.1R3
Patch: 20.2
Version: 20.3R1   < 20.3*
Version: 20.4   < 20.4R3
Version: 21.1   < 21.1R2
Create a notification for this product.
   Juniper Networks Junos OS Evolved Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:32:10.679Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11191",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "5.6R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "5.6*",
                     status: "affected",
                     version: "5.6R1",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "15.1F1",
                           status: "affected",
                        },
                     ],
                     lessThan: "15.1R7-S10",
                     status: "affected",
                     version: "15.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "16.1*",
                     status: "affected",
                     version: "16.1R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "16.2*",
                     status: "affected",
                     version: "16.2R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.1*",
                     status: "affected",
                     version: "17.1R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.2*",
                     status: "affected",
                     version: "17.2R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.3*",
                     status: "affected",
                     version: "17.3R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.4*",
                     status: "affected",
                     version: "17.4R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.1*",
                     status: "affected",
                     version: "18.1R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.2*",
                     status: "affected",
                     version: "18.2R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.3*",
                     status: "affected",
                     version: "18.3R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.4R2-S9, 18.4R3-S9",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S3",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R3",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S2",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3*",
                     status: "affected",
                     version: "20.3R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "18.4R1",
                           status: "affected",
                        },
                     ],
                     lessThan: "18.4R2-S9, 18.4R3-S9",
                     status: "affected",
                     version: "18.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S3",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1R3",
                     status: "affected",
                     version: "20.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S2",
                     status: "unaffected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3*",
                     status: "affected",
                     version: "20.3R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS Evolved",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "unaffected",
                     version: "Any",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "First in config CLI mode check that is there any user ARP policers configured on an ae interface:\n\n  show configuration | display set | match jtac-arp\n       set groups jtac-arp-policer interfaces ae5 unit <*> family inet policer arp jtac-arp  <<< this shows user arp policer configured on all ae interfaces\n\nNext validate which ARP policer is installed by using the operational cli command:\n\n“show interfaces extensive | match policer”\n  show interfaces extensive | match policer\n      Policer: Input: __default_arp_policer__   <<< incorrect if user arp policer was applied on ae interface and default arp policer is displayed\n      Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user arp policer was applied on ae interface",
            },
         ],
         datePublic: "2021-07-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command \"show interfaces <> extensive\" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-367",
                     description: "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-07-15T20:01:05",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA11191",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: For all platforms, except SRX Series, using Junos OS 15.1R7-S10, 18.4R2-S9, 18.4R3-S9, 19.4R3-S4, 20.1R3, 20.2R3-S2, 20.4R3, 21.1R2, 21.2R1, and all subsequent releases. On SRX series using Junos OS 18.4R2-S9, 18.4R3-S9, 19.4R3-S4. 20.1R3, 20.4R3, 21.1R2, 21.2R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11191",
            defect: [
               "1528403",
            ],
            discovery: "USER",
         },
         title: "Junos OS: User-defined ARP Policer isn't applied on Aggregated Ethernet (AE) interface until firewall process is restarted",
         workarounds: [
            {
               lang: "en",
               value: "There is no workaround for this issue. \n\nIf affected by this issue, to recover from its impact, restart the firewall process to update the ARP Policer on the AE interface unit(s).  \nFrom the CLI issue: \n\n  cli> restart firewall \n\nNote: no side effects on firewall restart shall be seen when issuing this command.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2021-07-14T16:00:00.000Z",
               ID: "CVE-2021-0289",
               STATE: "PUBLIC",
               TITLE: "Junos OS: User-defined ARP Policer isn't applied on Aggregated Ethernet (AE) interface until firewall process is restarted",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_name: "5.6",
                                          version_value: "5.6R1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "15.1",
                                          version_value: "15.1R7-S10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "15.1",
                                          version_value: "15.1F1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "16.1",
                                          version_value: "16.1R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "16.2",
                                          version_value: "16.2R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "17.1",
                                          version_value: "17.1R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "17.2",
                                          version_value: "17.2R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "17.3",
                                          version_value: "17.3R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "17.4",
                                          version_value: "17.4R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "18.1",
                                          version_value: "18.1R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "18.2",
                                          version_value: "18.2R1",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "18.3",
                                          version_value: "18.3R1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R2-S9, 18.4R3-S9",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R3-S3",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R3",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_name: "20.3",
                                          version_value: "20.3R1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2",
                                       },
                                       {
                                          version_affected: "!<",
                                          version_value: "5.6R1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "18.4",
                                          version_value: "18.4R2-S9, 18.4R3-S9",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "19.4",
                                          version_value: "19.4R3-S3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.1",
                                          version_value: "20.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "!<",
                                          version_name: "20.2",
                                          version_value: "20.2R3-S2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: ">=",
                                          version_name: "20.3",
                                          version_value: "20.3R1",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "!<",
                                          version_name: "18.4",
                                          version_value: "18.4R1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Junos OS Evolved",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "!",
                                          version_name: "Any",
                                          version_value: "Any",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "First in config CLI mode check that is there any user ARP policers configured on an ae interface:\n\n  show configuration | display set | match jtac-arp\n       set groups jtac-arp-policer interfaces ae5 unit <*> family inet policer arp jtac-arp  <<< this shows user arp policer configured on all ae interfaces\n\nNext validate which ARP policer is installed by using the operational cli command:\n\n“show interfaces extensive | match policer”\n  show interfaces extensive | match policer\n      Policer: Input: __default_arp_policer__   <<< incorrect if user arp policer was applied on ae interface and default arp policer is displayed\n      Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user arp policer was applied on ae interface",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command \"show interfaces <> extensive\" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11191",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA11191",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: For all platforms, except SRX Series, using Junos OS 15.1R7-S10, 18.4R2-S9, 18.4R3-S9, 19.4R3-S4, 20.1R3, 20.2R3-S2, 20.4R3, 21.1R2, 21.2R1, and all subsequent releases. On SRX series using Junos OS 18.4R2-S9, 18.4R3-S9, 19.4R3-S4. 20.1R3, 20.4R3, 21.1R2, 21.2R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11191",
               defect: [
                  "1528403",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There is no workaround for this issue. \n\nIf affected by this issue, to recover from its impact, restart the firewall process to update the ARP Policer on the AE interface unit(s).  \nFrom the CLI issue: \n\n  cli> restart firewall \n\nNote: no side effects on firewall restart shall be seen when issuing this command.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2021-0289",
      datePublished: "2021-07-15T20:01:05.615580Z",
      dateReserved: "2020-10-27T00:00:00",
      dateUpdated: "2024-09-17T03:48:59.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-0045
Vulnerability from cvelistv5
Published
2018-10-10 18:00
Modified
2024-09-17 00:25
Summary
Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Protocol Independent Multicast (PIM) protocol within the VPN. This issue can only be exploited from the PE device within the MPLS domain which is capable of forwarding IP multicast traffic in core. End-users connected to the CE device cannot cause this crash. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.1 versions prior to 18.1R2. No other Juniper Networks products or platforms are affected by this issue.
References
https://kb.juniper.net/JSA10879x_refsource_CONFIRM
http://www.securitytracker.com/id/1041848vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 12.1X46   < 12.1X46-D77
Version: 12.3X48   < 12.3X48-D70
Version: 15.1X49   < 15.1X49-D140
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1F6
Version: 12.3   < 12.3R12-S10
Version: 15.1   < 15.1R4-S9, 15.1R6-S6, 15.1R7
Version: 16.1   < 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7
Version: 16.2   < 16.2R1-S6, 16.2R2-S6, 16.2R3
Version: 17.1   < 17.1R1-S7, 17.1R2-S7, 17.1R3
Version: 17.2   < 17.2R2-S4, 17.2R3
Version: 17.3   < 17.3R2-S2, 17.3R3
Version: 17.4   < 17.4R1-S3, 17.4R2
Version: 18.1   < 18.1R2
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53   < 15.1X53-D59
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53   < 15.1X53-D67
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53   < 15.1X53-D233
Create a notification for this product.
   Juniper Networks Junos OS Version: 15.1X53   < 15.1X53-D471, 15.1X53-D490
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T03:14:16.271Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA10879",
               },
               {
                  name: "1041848",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1041848",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "12.1X46-D77",
                     status: "affected",
                     version: "12.1X46",
                     versionType: "custom",
                  },
                  {
                     lessThan: "12.3X48-D70",
                     status: "affected",
                     version: "12.3X48",
                     versionType: "custom",
                  },
                  {
                     lessThan: "15.1X49-D140",
                     status: "affected",
                     version: "15.1X49",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "15.1F6",
                  },
                  {
                     lessThan: "12.3R12-S10",
                     status: "affected",
                     version: "12.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "15.1R4-S9, 15.1R6-S6, 15.1R7",
                     status: "affected",
                     version: "15.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7",
                     status: "affected",
                     version: "16.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "16.2R1-S6, 16.2R2-S6, 16.2R3",
                     status: "affected",
                     version: "16.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.1R1-S7, 17.1R2-S7, 17.1R3",
                     status: "affected",
                     version: "17.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.2R2-S4, 17.2R3",
                     status: "affected",
                     version: "17.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.3R2-S2, 17.3R3",
                     status: "affected",
                     version: "17.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "17.4R1-S3, 17.4R2",
                     status: "affected",
                     version: "17.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "18.1R2",
                     status: "affected",
                     version: "18.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "EX2300/EX3400 Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "15.1X53-D59",
                     status: "affected",
                     version: "15.1X53",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "QFX10K Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "15.1X53-D67",
                     status: "affected",
                     version: "15.1X53",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "QFX5200/QFX5110 Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "15.1X53-D233",
                     status: "affected",
                     version: "15.1X53",
                     versionType: "custom",
                  },
               ],
            },
            {
               platforms: [
                  "NFX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "15.1X53-D471, 15.1X53-D490",
                     status: "affected",
                     version: "15.1X53",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "This issue may occurs when the Junos OS device is configured with:\n  [routing-instances <name> protocols pim mvpn] \n  [routing-instances <name> provider-tunnel pim-*]",
            },
         ],
         datePublic: "2018-10-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Protocol Independent Multicast (PIM) protocol within the VPN. This issue can only be exploited from the PE device within the MPLS domain which is capable of forwarding IP multicast traffic in core. End-users connected to the CE device cannot cause this crash. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.1 versions prior to 18.1R2. No other Juniper Networks products or platforms are affected by this issue.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-11T09:57:01",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA10879",
            },
            {
               name: "1041848",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1041848",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 12.1X46-D77, 12.3R12-S10, 12.3X48-D70, 15.1R4-S9, 15.1R6-S6, 15.1R7, 15.1X49-D140, 15.1X53-D233, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D67, 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7, 16.2R1-S6, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R2-S4, 17.2R3, 17.3R2-S2, 17.3R3, 17.4R1-S3, 17.4R2, 18.1R2, 18.2R1, 18.2X75-D5 and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA10879",
            defect: [
               "1339567",
            ],
            discovery: "USER",
         },
         title: "Junos OS: RPD daemon crashes due to receipt of specific Draft-Rosen MVPN control packet in Draft-Rosen MVPN configuration",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2018-10-10T16:00:00.000Z",
               ID: "CVE-2018-0045",
               STATE: "PUBLIC",
               TITLE: "Junos OS: RPD daemon crashes due to receipt of specific Draft-Rosen MVPN control packet in Draft-Rosen MVPN configuration",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "<",
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "12.1X46",
                                          version_value: "12.1X46-D77",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "12.3",
                                          version_value: "12.3R12-S10",
                                       },
                                       {
                                          affected: "<",
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "12.3X48",
                                          version_value: "12.3X48-D70",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "15.1",
                                          version_value: "15.1R4-S9, 15.1R6-S6, 15.1R7",
                                       },
                                       {
                                          affected: "=",
                                          version_affected: "=",
                                          version_name: "15.1F6",
                                          version_value: "15.1F6",
                                       },
                                       {
                                          affected: "<",
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "15.1X49",
                                          version_value: "15.1X49-D140",
                                       },
                                       {
                                          affected: "<",
                                          platform: "EX2300/EX3400 Series",
                                          version_affected: "<",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D59",
                                       },
                                       {
                                          affected: "<",
                                          platform: "QFX10K Series",
                                          version_affected: "<",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D67",
                                       },
                                       {
                                          affected: "<",
                                          platform: "QFX5200/QFX5110 Series",
                                          version_affected: "<",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D233",
                                       },
                                       {
                                          affected: "<",
                                          platform: "NFX Series",
                                          version_affected: "<",
                                          version_name: "15.1X53",
                                          version_value: "15.1X53-D471, 15.1X53-D490",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "16.1",
                                          version_value: "16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "16.2",
                                          version_value: "16.2R1-S6, 16.2R2-S6, 16.2R3",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.1",
                                          version_value: "17.1R1-S7, 17.1R2-S7, 17.1R3",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.2",
                                          version_value: "17.2R2-S4, 17.2R3",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.3",
                                          version_value: "17.3R2-S2, 17.3R3",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "17.4",
                                          version_value: "17.4R1-S3, 17.4R2",
                                       },
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_name: "18.1",
                                          version_value: "18.1R2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "This issue may occurs when the Junos OS device is configured with:\n  [routing-instances <name> protocols pim mvpn] \n  [routing-instances <name> provider-tunnel pim-*]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Protocol Independent Multicast (PIM) protocol within the VPN. This issue can only be exploited from the PE device within the MPLS domain which is capable of forwarding IP multicast traffic in core. End-users connected to the CE device cannot cause this crash. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.1 versions prior to 18.1R2. No other Juniper Networks products or platforms are affected by this issue.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA10879",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA10879",
                  },
                  {
                     name: "1041848",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1041848",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 12.1X46-D77, 12.3R12-S10, 12.3X48-D70, 15.1R4-S9, 15.1R6-S6, 15.1R7, 15.1X49-D140, 15.1X53-D233, 15.1X53-D471, 15.1X53-D490, 15.1X53-D59, 15.1X53-D67, 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7, 16.2R1-S6, 16.2R2-S6, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R2-S4, 17.2R3, 17.3R2-S2, 17.3R3, 17.4R1-S3, 17.4R2, 18.1R2, 18.2R1, 18.2X75-D5 and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA10879",
               defect: [
                  "1339567",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no known workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2018-0045",
      datePublished: "2018-10-10T18:00:00Z",
      dateReserved: "2017-11-16T00:00:00",
      dateUpdated: "2024-09-17T00:25:26.719Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22394
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-07 15:43
Summary
An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is enabled. Successful exploitation of this vulnerability prevents additional SIP calls and applications from succeeding. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.1 versions 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1. This issue does not affect Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 18.2R1.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: unspecified   < 19.3R3-S7
Version: 19.4   < 19.4R2-S8, 19.4R3-S10
Version: 20.1R1   < 20.1*
Version: 20.2   < 20.2R3-S6
Version: 20.3   < 20.3R3-S6
Version: 20.4   < 20.4R3-S5
Version: 21.1   < 21.1R3-S5
Version: 21.2   < 21.2R3-S1
Version: 21.3   < 21.3R3
Version: 21.4   < 21.4R2-S2, 21.4R3
Version: 22.1   < 22.1R1-S2, 22.1R2, 22.1R3-S1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.676Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70190",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22394",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-07T15:10:58.035676Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-07T15:43:11.641Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "18.2R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R2-S8, 19.4R3-S10",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1*",
                     status: "affected",
                     version: "20.1R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S6",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S6",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S5",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S5",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S1",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2-S2, 21.4R3",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R1-S2, 22.1R2, 22.1R3-S1",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is enabled. Successful exploitation of this vulnerability prevents additional SIP calls and applications from succeeding. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.1 versions 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1. This issue does not affect Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 18.2R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-911",
                     description: "CWE-911 Improper Update of Reference Count",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70190",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R2-S8, 19.4R3-S10, 20.2R3-S6, 20.3R3-S6, 20.4R3-S5, 21.1R3-S5, 21.2R3-S1, 21.3R3, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R2, 22.1R3-S1, 22.2R1, 22.3R1, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA70190",
            defect: [
               "1653902",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls ",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22394",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-07T15:43:11.641Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36845
Vulnerability from cvelistv5
Published
2023-08-17 19:17
Modified
2025-02-13 16:56
Severity ?
Summary
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.1   
Version: 21.2   
Version: 21.3   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Version: 23,2   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:01:09.559Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "mitigation",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA72300",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36845",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-11-15T16:40:40.516848Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-11-13",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-36845",
                     },
                     type: "kev",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-03T16:30:06.237Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "EX Series",
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S9",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.1*",
                     status: "affected",
                     version: "21.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R3-S7",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.3R3-S5",
                     status: "affected",
                     version: "21.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S5",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S4",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S2",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R2-S2, 22.3R3-S1",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R2-S1, 22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R1-S1, 23.2R2",
                     status: "affected",
                     version: "23,2",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The following minimal configuration is necessary:</p><code>&nbsp; [system services web-management http]</code><p>or</p><code>&nbsp; [system services web-management https]</code><br>",
                  },
               ],
               value: "The following minimal configuration is necessary:\n\n  [system services web-management http]or\n\n  [system services web-management https]",
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "LYS, working with DEVCORE Internship Program",
            },
         ],
         datePublic: "2023-08-17T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\n<span style=\"background-color: rgb(255, 255, 255);\">and SRX Series </span>\n\nallows an unauthenticated, network-based attacker to remotely execute code.<br><br>Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code<span style=\"background-color: rgb(255, 255, 255);\">.</span>\n\n<br><p>This issue affects Juniper Networks Junos OS on <span style=\"background-color: rgb(255, 255, 255);\">EX Series</span>\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">and </span>\n\n\nSRX Series:</p><p></p><ul><li>All versions prior to \n\n<span style=\"background-color: rgb(255, 255, 255);\">20.4R3-S9;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">21.1 versions 21.1R1 and later;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">21.2 versions prior to&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.2R3-S7;</span></span></li><li><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">21.3 versions prior to&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">21.3R3-S5;</span></span></span></li><li>21.4 versions prior to 21.4R3-S5;</li><li>22.1 versions \n\nprior to \n\n22.1R3-S4;</li><li>22.2 versions \n\nprior to \n\n22.2R3-S2;</li><li>22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;</li><li>22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;</li><li>23.2 versions prior to 23.2R1-S1, 23.2R2.</li></ul><p></p>",
                  },
               ],
               value: "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to remotely execute code.\n\nUsing a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series\n\n\nand \n\n\nSRX Series:\n\n\n\n  *  All versions prior to \n\n20.4R3-S9;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S7;\n  *  21.3 versions prior to 21.3R3-S5;\n  *  21.4 versions prior to 21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S4;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n  *  23.2 versions prior to 23.2R1-S1, 23.2R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.<br>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-473",
                     description: "CWE-473 PHP External Variable Modification",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-02T17:06:19.472Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
                  "mitigation",
               ],
               url: "https://supportportal.juniper.net/JSA72300",
            },
            {
               url: "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
            },
            {
               url: "http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: \n\n<span style=\"background-color: rgb(255, 255, 255);\">20.4R3-S9*,&nbsp;</span>21.2R3-S7*,&nbsp;21.3R3-S5,&nbsp;21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1*, 22.4R2-S1, 22.4R3*, 23.2R1-S1, 23.2R2*,&nbsp;23.4R1*<span style=\"background-color: var(--wht);\">, and all subsequent releases.</span><span style=\"background-color: rgb(255, 255, 255);\"><br></span>\n\n*Pending Publication\n\n\n\n<br>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1*, 22.4R2-S1, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases.\n\n\n*Pending Publication",
            },
         ],
         source: {
            defect: [
               "1736942",
            ],
            discovery: "EXTERNAL",
         },
         title: "Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Disable J-Web, or limit access to only trusted hosts.<br>",
                  },
               ],
               value: "Disable J-Web, or limit access to only trusted hosts.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-36845",
      datePublished: "2023-08-17T19:17:57.183Z",
      dateReserved: "2023-06-27T16:17:25.277Z",
      dateUpdated: "2025-02-13T16:56:28.897Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22417
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-08 13:33
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.3R3-S7
Version: 19.4   < 19.4R2-S8, 19.4R3-S10
Version: 20.2   < 20.2R3-S6
Version: 20.3   < 20.3R3-S5
Version: 20.4   < 20.4R3-S5
Version: 21.1   < 21.1R3-S4
Version: 21.2   < 21.2R3
Version: 21.3   < 21.3R3
Version: 21.4   < 21.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.550Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70213",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22417",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-08T13:32:43.911495Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-08T13:33:02.446Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.3R3-S7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R2-S8, 19.4R3-S10",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S6",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S5",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S5",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S4",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-401",
                     description: "CWE-401 Missing Release of Memory after Effective Lifetime",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70213",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.3R3-S7, 19.4R2-S8, 19.4R3-S10, 20.2R3-S6, 20.3R3-S5, 20.4R3-S5, 21.1R3-S4, 21.2R3, 21.3R3, 21.4R2, 22.1R1, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA70213",
            defect: [
               "1639998",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: A memory leak might be observed in IPsec VPN scenario leading to an FPC crash",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22417",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-08T13:33:02.446Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22218
Vulnerability from cvelistv5
Published
2022-10-18 02:46
Modified
2024-09-16 21:08
Summary
On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.1R3-S9
Version: 19.2   < 19.2R3-S6
Version: 19.3   < 19.3R3-S7
Version: 19.4   < 19.4R3-S9
Version: 20.2   < 20.2R3-S5
Version: 20.3   < 20.3R3-S4
Version: 20.4   < 20.4R3-S4
Version: 21.1   < 21.1R3-S1
Version: 21.2   < 21.2R3
Version: 21.3   < 21.3R2
Version: 21.4   < 21.4R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.214Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69901",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.1R3-S9",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.2R3-S6",
                     status: "affected",
                     version: "19.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.3R3-S7",
                     status: "affected",
                     version: "19.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "19.4R3-S9",
                     status: "affected",
                     version: "19.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S5",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S4",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S4",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S1",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R2",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "The following minimal configuration must be present to be potentially vulnerable to this issue:\n  [security pki auto-re-enrollment cmpv2]",
            },
         ],
         datePublic: "2022-10-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-754",
                     description: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-18T00:00:00",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA69901",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue:\n\nJunos OS: 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69901",
            defect: [
               "1642410",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22218",
      datePublished: "2022-10-18T02:46:21.921498Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T21:08:54.983Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22409
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-07 15:33
Summary
An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: unspecified   < 19.4R3-S10
Version: 20.1R1   < 20.1*
Version: 20.2   < 20.2R3-S6
Version: 20.3   < 20.3R3-S6
Version: 20.4   < 20.4R3-S5
Version: 21.1   < 21.1R3-S4
Version: 21.2   < 21.2R3-S3
Version: 21.3   < 21.3R3-S3
Version: 21.4   < 21.4R3-S1
Version: 22.1   < 22.1R2-S2, 22.1R3
Version: 22.2   < 22.2R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:07:06.724Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA70205",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22409",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-07T14:57:50.420083Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-07T15:33:24.631Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series, MX Series with SPC3",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "19.4R3-S10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.1*",
                     status: "affected",
                     version: "20.1R1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.2R3-S6",
                     status: "affected",
                     version: "20.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S6",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S5",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3-S4",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R3-S3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R3-S3",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.4R3-S1",
                     status: "affected",
                     version: "21.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.1R2-S2, 22.1R3",
                     status: "affected",
                     version: "22.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.2R2",
                     status: "affected",
                     version: "22.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2023-01-11T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent \"deterministic NAT\" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "606 Unchecked Input for Loop Condition",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T00:00:00.000Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA70205",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 19.4R3-S10, 20.2R3-S6, 20.3R3-S6, 20.4R3-S5, 21.1R3-S4, 21.2R3-S3, 21.3R3-S3, 21.4R3-S1, 22.1R2-S2, 22.1R3, 22.2R2, 22.3R1, and all subsequent releases.\n",
            },
         ],
         source: {
            advisory: "JSA70205",
            defect: [
               "1656798",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series, MX Series with SPC3: When an inconsistent NAT configuration exists and a specific CLI command is issued the SPC will reboot",
         workarounds: [
            {
               lang: "en",
               value: "Please ensure the deterministic NAT configuration is consistent as shown in the description of the problem section.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2023-22409",
      datePublished: "2023-01-12T00:00:00.000Z",
      dateReserved: "2022-12-27T00:00:00.000Z",
      dateUpdated: "2025-04-07T15:33:24.631Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22205
Vulnerability from cvelistv5
Published
2022-07-20 14:12
Modified
2024-09-17 01:46
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the Application Quality of Experience (appqoe) subsystem of the PFE of Juniper Networks Junos OS on SRX Series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). Upon receiving specific traffic a memory leak will occur. Sustained processing of such specific traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. A device is only vulnerable when advance(d) policy based routing (APBR) is configured and AppQoE (sla rule) is not configured for these APBR rules. This issue affects Juniper Networks Junos OS on SRX Series: 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.3R1.
References
https://kb.juniper.net/JSA69709x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.3   < 20.3R3-S2
Version: 20.4   < 20.4R3-S2
Version: 21.1   < 21.1R3
Version: 21.2   < 21.2R2-S1, 21.2R3
Version: 21.3   < 21.3R1-S2, 21.3R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.867Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69709",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.3R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.3R3-S2",
                     status: "affected",
                     version: "20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3-S2",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2-S1, 21.2R3",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.3R1-S2, 21.3R2",
                     status: "affected",
                     version: "21.3",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Application Quality of Experience (appqoe) subsystem of the PFE of Juniper Networks Junos OS on SRX Series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). Upon receiving specific traffic a memory leak will occur. Sustained processing of such specific traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. A device is only vulnerable when advance(d) policy based routing (APBR) is configured and AppQoE (sla rule) is not configured for these APBR rules. This issue affects Juniper Networks Junos OS on SRX Series: 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.3R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-401",
                     description: "CWE-401 Missing Release of Memory after Effective Lifetime",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T14:12:50",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69709",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.3R3-S2, 20.4R3-S2, 21.1R3, 21.2R2-S1, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69709",
            defect: [
               "1628090",
            ],
            discovery: "USER",
         },
         title: "Junos OS: SRX Series: An FPC memory leak can occur in an APBR scenario",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-07-13T07:00:00.000Z",
               ID: "CVE-2022-22205",
               STATE: "PUBLIC",
               TITLE: "Junos OS: SRX Series: An FPC memory leak can occur in an APBR scenario",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.3",
                                          version_value: "20.3R3-S2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3-S2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2-S1, 21.2R3",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "<",
                                          version_name: "21.3",
                                          version_value: "21.3R1-S2, 21.3R2",
                                       },
                                       {
                                          platform: "SRX Series",
                                          version_affected: "!<",
                                          version_value: "20.3R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Application Quality of Experience (appqoe) subsystem of the PFE of Juniper Networks Junos OS on SRX Series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). Upon receiving specific traffic a memory leak will occur. Sustained processing of such specific traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. A device is only vulnerable when advance(d) policy based routing (APBR) is configured and AppQoE (sla rule) is not configured for these APBR rules. This issue affects Juniper Networks Junos OS on SRX Series: 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.3R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-401 Missing Release of Memory after Effective Lifetime",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69709",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69709",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 20.3R3-S2, 20.4R3-S2, 21.1R3, 21.2R2-S1, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA69709",
               defect: [
                  "1628090",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22205",
      datePublished: "2022-07-20T14:12:50.665147Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-17T01:46:28.226Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21619
Vulnerability from cvelistv5
Published
2024-01-25 22:48
Modified
2024-08-01 22:27
Summary
A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to access sensitive system information. When a user logs in, a temporary file which contains the configuration of the device (as visible to that user) is created in the /cache folder. An unauthenticated attacker can then attempt to access such a file by sending a specific request to the device trying to guess the name of such a file. Successful exploitation will reveal configuration information. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R1-S2, 23.2R2.
References
https://supportportal.juniper.net/JSA76390vendor-advisory
Impacted products
Vendor Product Version
Juniper Networks Junos OS Version: 0   
Version: 21.2   
Version: 21.3   
Version: 21.4   
Version: 22.1   
Version: 22.2   
Version: 22.3   
Version: 22.4   
Version: 23.2   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:35.795Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA76390",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "SRX Series",
                  "EX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R3-S9",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.2R3-S7",
                     status: "affected",
                     version: "21.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.3R3-S5",
                     status: "affected",
                     version: "21.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S6",
                     status: "affected",
                     version: "21.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.1R3-S5",
                     status: "affected",
                     version: "22.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S3",
                     status: "affected",
                     version: "22.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-S2",
                     status: "affected",
                     version: "22.3",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R3",
                     status: "affected",
                     version: "22.4",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R1-S2, 23.2R2",
                     status: "affected",
                     version: "23.2",
                     versionType: "semver",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "The Juniper SIRT would like to acknowledge and thank watchtowr for responsibly reporting this vulnerability.",
            },
         ],
         datePublic: "2024-01-25T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to access sensitive system information.<br><br>When a user logs in, a temporary file which contains the configuration of the device (as visible to that user) is created in the /cache folder. An unauthenticated attacker can then attempt to access such a file by sending a specific request to the device trying to guess the name of such a file. Successful exploitation will reveal configuration information.<br><br>This issue affects Juniper Networks Junos OS on SRX Series and EX Series:<br><ul><li>All versions earlier than 20.4R3-S9;</li><li>21.2 versions earlier than 21.2R3-S7;</li><li>21.3 versions earlier than 21.3R3-S5;</li><li>21.4 versions earlier than 21.4R3-S6;</li><li>22.1 versions earlier than 22.1R3-S5;</li><li>22.2 versions earlier than 22.2R3-S3;</li><li>22.3 versions earlier than 22.3R3-S2;</li><li>22.4 versions earlier than 22.4R3;</li><li>23.2 versions earlier than 23.2R1-S2, 23.2R2.</li></ul>",
                  },
               ],
               value: "A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to access sensitive system information.\n\nWhen a user logs in, a temporary file which contains the configuration of the device (as visible to that user) is created in the /cache folder. An unauthenticated attacker can then attempt to access such a file by sending a specific request to the device trying to guess the name of such a file. Successful exploitation will reveal configuration information.\n\nThis issue affects Juniper Networks Junos OS on SRX Series and EX Series:\n  *  All versions earlier than 20.4R3-S9;\n  *  21.2 versions earlier than 21.2R3-S7;\n  *  21.3 versions earlier than 21.3R3-S5;\n  *  21.4 versions earlier than 21.4R3-S6;\n  *  22.1 versions earlier than 22.1R3-S5;\n  *  22.2 versions earlier than 22.2R3-S3;\n  *  22.3 versions earlier than 22.3R3-S2;\n  *  22.4 versions earlier than 22.4R3;\n  *  23.2 versions earlier than 23.2R1-S2, 23.2R2.\n\n\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-306",
                     description: "CWE-306 Missing Authentication for Critical Function",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-209",
                     description: "CWE-209 Generation of Error Message Containing Sensitive Information",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-25T22:52:44.703Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA76390",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The following software releases have been updated to resolve this specific issue: 20.4R3-S9, 21.2R3-S7*, 21.3R3-S5, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R2-S2, 22.4R3*, 23.2R1-S2, 23.2R2*, 23.4R1, and all subsequent releases.</p><p>*Pending Publication</p>",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3-S9, 21.2R3-S7*, 21.3R3-S5, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R2-S2, 22.4R3*, 23.2R1-S2, 23.2R2*, 23.4R1, and all subsequent releases.\n\n*Pending Publication\n\n",
            },
         ],
         source: {
            defect: [
               "1763260",
            ],
            discovery: "EXTERNAL",
         },
         timeline: [
            {
               lang: "en",
               time: "2024-01-25T17:00:00.000Z",
               value: "Initial Publication",
            },
         ],
         title: "Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Disable J-Web, or limit access to only trusted hosts.</p>",
                  },
               ],
               value: "Disable J-Web, or limit access to only trusted hosts.\n\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-av217",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-21619",
      datePublished: "2024-01-25T22:48:16.839Z",
      dateReserved: "2023-12-27T19:38:25.710Z",
      dateUpdated: "2024-08-01T22:27:35.795Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22198
Vulnerability from cvelistv5
Published
2022-04-14 15:51
Modified
2024-09-17 02:57
Summary
An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1.
References
https://kb.juniper.net/JSA69513x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Patch: unspecified
Version: 20.4   < 20.4R3
Version: 21.1   < 21.1R2-S1, 21.1R3
Version: 21.2   < 21.2R2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.206Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69513",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "MX Series, SRX Series",
               ],
               product: "Junos OS",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "20.4R1",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "20.4R3",
                     status: "affected",
                     version: "20.4",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.1R2-S1, 21.1R3",
                     status: "affected",
                     version: "21.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.2R2",
                     status: "affected",
                     version: "21.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with:\n\n  user@host> show security alg status | match sip\n  SIP : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ]\n\nwhere either\na. name = junos-sip or\nan application or application-set refers to SIP:\nb. [ applications application <name> application-protocol sip ] or\nc. [ applications application-set <name> application junos-sip ]",
            },
         ],
         datePublic: "2022-04-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-824",
                     description: "CWE-824 Access of Uninitialized Pointer",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     description: "Denial of Service (DoS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-14T15:51:01",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69513",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 20.4R3, 21.1R2-S1, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69513",
            defect: [
               "1612450",
            ],
            discovery: "USER",
         },
         title: "Junos OS: MX MS-MPC or MS-MIC, or SRX SPC crashes if it receives a SIP message with a specific contact header format",
         workarounds: [
            {
               lang: "en",
               value: "There are no viable workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-04-13T07:00:00.000Z",
               ID: "CVE-2022-22198",
               STATE: "PUBLIC",
               TITLE: "Junos OS: MX MS-MPC or MS-MIC, or SRX SPC crashes if it receives a SIP message with a specific contact header format",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Junos OS",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "20.4",
                                          version_value: "20.4R3",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "21.1",
                                          version_value: "21.1R2-S1, 21.1R3",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "<",
                                          version_name: "21.2",
                                          version_value: "21.2R2",
                                       },
                                       {
                                          platform: "MX Series, SRX Series",
                                          version_affected: "!<",
                                          version_value: "20.4R1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            configuration: [
               {
                  lang: "en",
                  value: "To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with:\n\n  user@host> show security alg status | match sip\n  SIP : Enabled\n\nPlease verify on MX whether the following is configured:\n\n  [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ]\n\nwhere either\na. name = junos-sip or\nan application or application-set refers to SIP:\nb. [ applications application <name> application-protocol sip ] or\nc. [ applications application-set <name> application junos-sip ]",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
               },
            ],
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-824 Access of Uninitialized Pointer",
                        },
                     ],
                  },
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service (DoS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69513",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69513",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 20.4R3, 21.1R2-S1, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA69513",
               defect: [
                  "1612450",
               ],
               discovery: "USER",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no viable workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22198",
      datePublished: "2022-04-14T15:51:01.439050Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-17T02:57:45.257Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on SRX Series.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on SRX Series.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de desbordamiento de búfer en SIP ALG de Juniper Networks Junos OS permite que un atacante no autenticado basado en la red provoque una denegación de servicio (DoS). En todas las plataformas de las series MX y SRX con SIP ALG habilitado, cuando se recibe un paquete SIP con formato incorrecto, el demonio de procesamiento de flujo (flowd) fallará y se reiniciará. Este problema afecta a: Juniper Networks Junos OS en las versiones MX Series y SRX Series 20.4 anteriores a 20.4R3-S5; Versiones 21.1 anteriores a 21.1R3-S4; Versiones 21.2 anteriores a 21.2R3-S2; Versiones 21.3 anteriores a 21.3R3-S1; Versiones 21.4 anteriores a 21.4R3; Versiones 22.1 anteriores a 22.1R1-S2, 22.1R2; Versiones 22.2 anteriores a 22.2R1-S1, 22.2R2. Este problema no afecta a las versiones de Juniper Networks Junos OS anteriores a 20.4R1 en la serie SRX.",
      },
   ],
   id: "CVE-2023-22416",
   lastModified: "2024-11-21T07:44:46.557",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:11.753",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70212",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70212",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-17 20:15
Modified
2025-03-10 20:31
Severity ?
Summary
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   cisaActionDue: "2023-11-17",
   cisaExploitAdd: "2023-11-13",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C445622E-8E57-4990-A71A-E1993BFCB91A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "5C1C3B09-3800-493E-A319-57648305FE6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EFF72FCA-C440-4D43-9BDB-F712DB413717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to remotely execute code.\n\nUsing a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series\n\n\nand \n\n\nSRX Series:\n\n\n\n  *  All versions prior to \n\n20.4R3-S9;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S7;\n  *  21.3 versions prior to 21.3R3-S5;\n  *  21.4 versions prior to 21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S4;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n  *  23.2 versions prior to 23.2R1-S1, 23.2R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de modificación de variable externa PHP en J-Web de Juniper Networks Junos OS en las series EX y SRX permite a un atacante no autenticado basado en red ejecutar código de forma remota. Mediante una solicitud manipulada que establece la variable PHPRC, un atacante puede modificar el entorno de ejecución de PHP, lo que permite la inyección y ejecución de código. Este problema afecta al sistema operativo Junos de Juniper Networks en las series EX y SRX: \n* Todas las versiones anteriores a 20.4R3-S9; \n* 21.1: versiones 21.1R1 y posteriores; \n* 21.2: versiones anteriores a 21.2R3-S7; \n* 21.3: versiones anteriores a 21.3R3-S5; \n* 21.4: versiones anteriores a 21.4R3-S5; \n* 22.1: versiones anteriores a 22.1R3-S4; \n* 22.2: versiones anteriores a 22.2R3-S2; \n* 22.3: versiones anteriores a 22.3R2-S2, 22.3R3-S1; \n* 22.4: versiones anteriores a 22.4R2-S1, 22.4R3; \n* 23.2: versiones anteriores a 23.2R1-S1, 23.2R2.",
      },
   ],
   id: "CVE-2023-36845",
   lastModified: "2025-03-10T20:31:09.807",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-17T20:15:10.360",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA72300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA72300",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-473",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On SRX Series devices using Unified Policies with IPv6, when a specific IPv6 packet goes through a dynamic-application filter which will generate an ICMP deny message, the flowd core is observed and the PFE is restarted. This issue affects: Juniper Networks Junos OS on SRX Series: 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
Impacted products
Vendor Product Version
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "2849078A-447A-4615-94E1-58AF450ED22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C2C625B6-25ED-4F6C-A778-6AB7FA7901CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*",
                     matchCriteriaId: "84EC3EE0-F1D9-4CBB-B3FA-83C05C50EB5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E38CD1E2-41F5-42D1-B915-055A497C576A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "0C816B9A-F152-4E5F-8152-73635840A89A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E0EA9DA-2DAD-4FA4-8CCC-E2F3D7069305",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "55F3E730-83F2-43C2-B6DC-77BAABB2F01D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "7F449CD5-9D3D-4D99-8A6F-8C7946A4F2D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On SRX Series devices using Unified Policies with IPv6, when a specific IPv6 packet goes through a dynamic-application filter which will generate an ICMP deny message, the flowd core is observed and the PFE is restarted. This issue affects: Juniper Networks Junos OS on SRX Series: 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de escritura fuera de los límites en el Flow Processing Daemon (flowd) de Juniper Networks Junos OS permite que un atacante no autenticado basado en la red provoque una denegación de servicio (DoS). En los dispositivos de la serie SRX que utilizan políticas unificadas con IPv6, cuando un paquete IPv6 específico pasa por un filtro de aplicación dinámica que generará un mensaje de denegación de ICMP, se observa el núcleo fluido y se reinicia el PFE. Este problema afecta a: Juniper Networks Junos OS en la serie SRX: versiones 19.2 anteriores a 19.2R3-S6; Versiones 19.3 anteriores a 19.3R3-S6; Versiones 19.4 anteriores a 19.4R3-S9; Versiones 20.2 anteriores a 20.2R3-S5; Versiones 20.3 anteriores a 20.3R3-S4; Versiones 20.4 anteriores a 20.4R3-S3; Versiones 21.1 anteriores a 21.1R3; Versiones 21.2 anteriores a 21.2R3; Versiones 21.3 anteriores a 21.3R2; Versiones 21.4 anteriores a 21.4R2.",
      },
   ],
   id: "CVE-2023-22411",
   lastModified: "2024-11-21T07:44:45.880",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:11.377",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70207",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70207",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-18 03:15
Modified
2024-11-21 06:46
Summary
An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When specific valid SIP packets are received the PFE will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
Impacted products
Vendor Product Version
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When specific valid SIP packets are received the PFE will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de acceso de puntero no inicializado en SIP Application Layer Gateway (ALG) de Juniper Networks Junos OS en las series SRX y MX permite a un atacante no autenticado y basado en la red causar una Denegación de Servicio (DoS). Cuando son recibidos determinados paquetes SIP válidos, el ALG es bloqueado y es reiniciado. Este problema afecta a Juniper Networks Junos OS en las series SRX y MX: versiones 20.4 anteriores a 20.4R3-S4; versiones 21.1 anteriores a 21.1R3-S2; versiones 21.2 anteriores a 21.2R3-S2; versiones 21.3 anteriores a 21.3R2-S2, 21.3R3; versiones 21.4 anteriores a 21.4R1-S2, 21.4R2; versiones 22.1 anteriores a 22.1R1-S1, 22.1R2. Este problema no afecta a Juniper Networks Junos OS versiones anteriores a 20.4R1",
      },
   ],
   id: "CVE-2022-22236",
   lastModified: "2024-11-21T06:46:27.443",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-18T03:15:10.603",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69892",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69892",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-11 17:15
Modified
2025-04-11 14:50
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage. This issue affects Junos OS: 21.2 releases from 21.2R3-S5 before 21.2R3-S6. This issue does not affect earlier or later releases.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B10DFCE-5331-4D79-8D9F-EF84743493D3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.\n\nThis issue affects Junos OS:\n\n21.2 releases from 21.2R3-S5 before 21.2R3-S6.\n\nThis issue does not affect earlier or later releases.",
      },
      {
         lang: "es",
         value: "Una verificación inadecuada de la vulnerabilidad de condiciones inusuales o excepcionales en Packet Forwarding Engine (pfe) de Juniper Networks Junos OS en la serie SRX y la serie MX con SPC3 permite que un atacante no autenticado basado en red provoque una denegación de servicio (DoS) . Cuando un dispositivo afectado recibe tráfico TCP válido específico, el pfe falla y se reinicia, lo que provoca una interrupción momentánea pero completa del servicio. Este problema afecta a Junos OS: versiones 21.2 de 21.2R3-S5 anteriores a 21.2R3-S6. Este problema no afecta a las versiones anteriores ni posteriores.",
      },
   ],
   id: "CVE-2024-39540",
   lastModified: "2025-04-11T14:50:12.097",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
      cvssMetricV40: [
         {
            cvssData: {
               Automatable: "NOT_DEFINED",
               Recovery: "NOT_DEFINED",
               Safety: "NOT_DEFINED",
               attackComplexity: "LOW",
               attackRequirements: "NONE",
               attackVector: "NETWORK",
               availabilityRequirement: "NOT_DEFINED",
               baseScore: 8.7,
               baseSeverity: "HIGH",
               confidentialityRequirement: "NOT_DEFINED",
               exploitMaturity: "NOT_DEFINED",
               integrityRequirement: "NOT_DEFINED",
               modifiedAttackComplexity: "NOT_DEFINED",
               modifiedAttackRequirements: "NOT_DEFINED",
               modifiedAttackVector: "NOT_DEFINED",
               modifiedPrivilegesRequired: "NOT_DEFINED",
               modifiedSubAvailabilityImpact: "NOT_DEFINED",
               modifiedSubConfidentialityImpact: "NOT_DEFINED",
               modifiedSubIntegrityImpact: "NOT_DEFINED",
               modifiedUserInteraction: "NOT_DEFINED",
               modifiedVulnAvailabilityImpact: "NOT_DEFINED",
               modifiedVulnConfidentialityImpact: "NOT_DEFINED",
               modifiedVulnIntegrityImpact: "NOT_DEFINED",
               privilegesRequired: "NONE",
               providerUrgency: "NOT_DEFINED",
               subAvailabilityImpact: "LOW",
               subConfidentialityImpact: "NONE",
               subIntegrityImpact: "NONE",
               userInteraction: "NONE",
               valueDensity: "NOT_DEFINED",
               vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
               version: "4.0",
               vulnAvailabilityImpact: "HIGH",
               vulnConfidentialityImpact: "NONE",
               vulnIntegrityImpact: "NONE",
               vulnerabilityResponseEffort: "NOT_DEFINED",
            },
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-11T17:15:12.883",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA83000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA83000",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-07-15 20:15
Modified
2024-11-21 05:42
Summary
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.
Impacted products
Vendor Product Version
juniper junos *
juniper junos *
juniper junos 5.6
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper acx1000 -
juniper acx1100 -
juniper acx2000 -
juniper acx2100 -
juniper acx2200 -
juniper acx4000 -
juniper acx500 -
juniper acx5000 -
juniper acx5048 -
juniper acx5096 -
juniper acx5400 -
juniper acx5448 -
juniper acx5800 -
juniper acx6300 -
juniper acx6360 -
juniper acx710 -
juniper atp400 -
juniper atp700 -
juniper csrx -
juniper ctp150 -
juniper ctp2008 -
juniper ctp2024 -
juniper ctp2056 -
juniper dx -
juniper dx 5.1
juniper ex_rps -
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-c -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300m -
juniper ex4400 -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper fips_infranet_controller_6500 -
juniper fips_secure_access_4000 -
juniper fips_secure_access_4500 -
juniper fips_secure_access_6000 -
juniper fips_secure_access_6500 -
juniper gfx3600 -
juniper idp250 -
juniper idp75 -
juniper idp800 -
juniper idp8200 -
juniper infranet_controller_4000 -
juniper infranet_controller_4500 -
juniper infranet_controller_6000 -
juniper infranet_controller_6500 -
juniper jatp 400
juniper jatp 700
juniper junos -
juniper junos_space_ja1500_appliance -
juniper junos_space_ja2500_appliance -
juniper ln1000 -
juniper ln2600 -
juniper m10i -
juniper m120 -
juniper m320 -
juniper m7i -
juniper mag2600_gateway -
juniper mag4610_gateway -
juniper mag6610_gateway -
juniper mag6611_gateway -
juniper mx -
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper netscreen-5200 -
juniper netscreen-5400 -
juniper netscreen-5gt -
juniper netscreen-5gt 5.0
juniper netscreen-idp 3.0
juniper netscreen-idp 3.0r1
juniper netscreen-idp 3.0r2
juniper netscreen-idp_10 -
juniper netscreen-idp_100 -
juniper netscreen-idp_1000 -
juniper netscreen-idp_500 -
juniper nfx -
juniper nfx150 -
juniper nfx250 -
juniper nfx350 -
juniper nsm3000 -
juniper nsmexpress -
juniper ocx1100 -
juniper ptx1000 -
juniper ptx1000-72q -
juniper ptx10000 -
juniper ptx10001 -
juniper ptx10001-36mr -
juniper ptx100016 -
juniper ptx10002 -
juniper ptx10002-60c -
juniper ptx10003 -
juniper ptx10003_160c -
juniper ptx10003_80c -
juniper ptx10003_81cd -
juniper ptx10004 -
juniper ptx10008 -
juniper ptx10016 -
juniper ptx3000 -
juniper ptx5000 -
juniper qfx10000 -
juniper qfx10002 -
juniper qfx10002-32q -
juniper qfx10002-60c -
juniper qfx10002-72q -
juniper qfx10008 -
juniper qfx10016 -
juniper qfx3000-g -
juniper qfx3000-m -
juniper qfx3008-i -
juniper qfx3100 -
juniper qfx3500 -
juniper qfx3600 -
juniper qfx3600-i -
juniper qfx5100 -
juniper qfx5100-96s -
juniper qfx5110 -
juniper qfx5120 -
juniper qfx5130 -
juniper qfx5200 -
juniper qfx5200-32c -
juniper qfx5200-48y -
juniper qfx5210 -
juniper qfx5210-64c -
juniper qfx5220 -
juniper router_m10 -
juniper router_m16 -
juniper router_m20 -
juniper router_m40 -
juniper router_m5 -
juniper secure_access_2000 -
juniper secure_access_2500 -
juniper secure_access_4000 -
juniper secure_access_4500 -
juniper secure_access_6000 -
juniper secure_access_6500 -
juniper secure_access_700 -
juniper t1600 -
juniper t320 -
juniper t4000 -
juniper t640 -
juniper xre200 -
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "01888A41-DD62-42C3-ADDB-9F98933D7D2C",
                     versionEndExcluding: "15.1",
                     versionStartIncluding: "5.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D00050D6-179F-44CA-81BF-0D62A3764DF7",
                     versionEndExcluding: "18.4",
                     versionStartIncluding: "15.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:5.6:r1:*:*:*:*:*:*",
                     matchCriteriaId: "97AFB83A-B200-48DA-B976-E170BB1AB752",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "2C1601BB-CAB7-4C92-8416-1824BB85D820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "14FC491D-8DA8-4E79-A9A6-3629E41C847A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "44C4BE2C-814F-49AA-8B64-17245FC01270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF19CB03-4A42-48BC-A6E1-A6F56D40F422",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "648CB4A2-05FA-4445-BB4F-F9285A8E8A5D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90339191-4DE3-4116-8CEC-C5440D063CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9F5683A-7DCC-4691-AD3A-F2B66684DA9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "154658D0-FE3E-43C1-8A4D-CAF67C9BCD98",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76E2CDA9-2379-482C-B509-D527AFE2C7D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36729286-5080-47E8-A961-976BF64F5A93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C398D8D-AD15-422C-90DE-2EAD9B9A7DF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx5048:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F8DB691-C9F4-4084-8563-642A2F63DA86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx5096:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44B58F51-4F0D-40BD-A90F-226A26F4646E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D013356B-A9FE-4301-BFEB-0D5B1AB3541D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx5448:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EB7B849-D1D4-46F3-B502-5D84C5E7C3B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D0730C3-5846-43E9-A9BD-8AEED356A959",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6655453A-D027-41A3-B1E9-D40A5220E4CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx6360:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58626682-A25D-46B6-B2B3-493772FFBA11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:acx710:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC3484A2-C7E4-43D1-9D47-08C531185C67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A96949A-031D-4E05-8915-1A6D6BE645E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "29D8A7A3-2DFB-4752-8509-451247A1D5D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ctp150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2DDF73E-3892-4CEF-A184-F337A8406A82",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ctp2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F92815F-B287-4A00-8D15-B44B9B0CB551",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ctp2024:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22D4B48C-CA58-4FA0-B31B-4ED7D96F7D79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ctp2056:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D82E84B-2B79-47DE-9033-B6711382CE56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:dx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6C49E-3AB5-4688-8BD7-0F9C274021F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:dx:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF678F5C-F375-475C-BBEC-A4FC5F94AEFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex_rps:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42877394-A0A1-4136-A1D3-D287BFCC85E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:fips_infranet_controller_6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4B171E2-3E7D-42CE-8F16-0C232222EC63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:fips_secure_access_4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC7A54-95DD-4C60-8A99-21F800616784",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:fips_secure_access_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B68C4310-771E-4E8F-9C62-6EBE233FCB92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:fips_secure_access_6000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55331F37-6F9B-48A8-BBB3-BE9EBF4C2B3D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:fips_secure_access_6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "528028F3-3F3F-4354-A1D7-2EF66BA27CEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:gfx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1587D9-B2C4-48E6-889E-D4AFB7154E47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:idp250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60A5EAF5-4E2C-4A5C-A4B8-6370490136AC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:idp75:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DD39F3D-8DD7-48DA-A8C2-543B8B05E50F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:idp800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "567C7544-3C8B-468B-A2A1-0750B4623EA1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:idp8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AC3940A-9974-48AC-BEA6-66F1DC8D91DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:infranet_controller_4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D39E3026-7E64-4201-8801-5138C52EA3BE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:infranet_controller_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1220A6C-A397-4BDD-A7D1-BF16BC35CE4A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:infranet_controller_6000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "602D3D3E-6859-4E6D-AF61-D58D26C78E65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:infranet_controller_6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4384E5A3-9D09-4340-943A-BB3408D85B8D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:jatp:400:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5723E51-E41D-4CBC-B433-C5D0845711C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:jatp:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBC93060-DCEA-4181-A38B-653FB165D2C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:junos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EA2466C-D443-4A63-AA4F-1AE4EE5DA02A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:junos_space_ja1500_appliance:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C58939FC-742F-4A93-8977-6953B32E6817",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:junos_space_ja2500_appliance:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D76C2611-F434-496C-8E30-4FA927223B81",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ln1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19C2C35E-BE56-436B-A917-95B8C0BD6B41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ln2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F11EE2D8-262D-44EC-B6A4-005C96AD5D06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:m10i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10374BF7-2AD3-483F-B3C1-950076934866",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:m120:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5FB57F2-6135-49FF-8D33-13B55F7020CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:m320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FA6BB73-A778-414B-8A92-6CB6886A32D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:m7i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6048CF-0BE2-4016-A95E-34799796014C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mag2600_gateway:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EE557B9-DF6D-4C20-98BE-E934D187CCFC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mag4610_gateway:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB174F88-B643-4338-BCD6-A9CD0EDB54A6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mag6610_gateway:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "115C8834-8BD1-4561-8B98-AE29E3B9C1C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mag6611_gateway:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54C5F933-61BB-40EA-9ADC-C22CFE8F9D1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72952BFC-45B9-4379-8D9A-A10132CC34EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-5200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A658500D-84C8-4F33-9AD3-2DF76DC41459",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2B4E7A-30F3-488E-A685-7CBF998C7E9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-5gt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFCCC02F-48ED-469D-808A-B17810A6E5C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A482DFA5-4108-4B0F-BD8E-04FEB52D3537",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B97B63E-CE45-4DF9-9838-D9CE96CECE72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE5F6D51-15B0-449D-9418-8C4C7A1E1D7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C696E607-0927-4087-A437-9C5459EB8BE5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9C332A8-746C-4FC8-84E3-D67C8C3D377A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6C2728-2D68-498A-A6F1-39DBEFABB1B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44AF925F-DF8C-456E-A61E-E94C5CED5A7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:netscreen-idp_500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C5D2B14-E517-4229-BB16-A1B8E5436959",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nfx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "322C5D3F-ADE3-417D-9355-187C9648ED1D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9AE81FA-B0F3-4F0B-A2D1-2BB590345058",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EB08A27-7777-4538-ADC4-9D2F89963C13",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nfx350:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CB56048-A486-4A46-B438-CC3084BD9CB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nsm3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DD754FD-CC22-47BA-A2A7-4835CC8E55E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nsmexpress:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E5B7D06-3E72-49C1-9ABA-7BD68860C1F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ocx1100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "290BA886-8174-4F62-A72C-D50BFDB7FDA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E6DF99D-E438-4943-BC32-F2821E72AE0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B219F54A-4474-48CB-80F1-D988A719C3DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "249F6266-4ED6-4464-9347-9322E1481D0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CDCCB33-D428-4D64-977E-71C62F89AE5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C188428C-0558-44FB-845C-E885DE9A0733",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx100016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F94757-34CE-4F88-A6D3-544FE6A476D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B22AC2-B794-4F12-9EB3-9AA6E4B19831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5462DF-5CF1-4DF9-989B-622EA734964F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BD05415-9F94-4EB8-805A-C9C0FFA9D0DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1E88A41-B158-4A66-9DFD-438931C6BE68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C97FFB5-8755-474B-ABCF-98DC7659208E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAECB1BF-0F3A-4AD9-AF6B-E54A13D9D804",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C432E543-37F5-4CA0-B239-2B97C6A16907",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A64A26-4606-4D33-8958-5A3B7FFC4CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1879799F-18B2-4958-AA90-FD19348C889F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "516476F9-7D4C-494F-99AA-750F4467CD15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "654140A0-FEC0-4DB4-83BF-ECCB000DFA4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF2039C-E08C-472F-82E6-DAD3F94724B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1401145-D8EC-4DB9-9CDE-9DE6C0D000C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17E59530-3262-4BDC-915C-0B8D2EED7784",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "626CA614-72D4-4A8B-9C38-275C7A7F8D85",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0FF30F4-3D10-4AD6-9643-5826A11C7629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1453E42A-77B3-4922-8EC3-1A5668C39550",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26408465-BD6A-4416-B98E-691A5F651080",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3000-g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79C98F71-042D-412D-8064-FF8E27CAB9D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3000-m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3110C458-EFBA-4221-9417-015B7D5874C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3008-i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0727FD0-F5A2-4156-BBDB-F4AE6E6F1B89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "858482CF-E310-4F6C-8ECC-C9BFBA3E1EC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A336BD3-4AB0-4E9E-8AD5-E6413A5A53FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F4D44B0-E6CE-4380-8712-AC832DBCB424",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3600-i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6F6C1E3-9390-4E06-AA62-02C99447FDB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E974B4BC-64C5-4BB6-AF31-D46AF3763416",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5100-96s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BD0F680-ED30-48F3-A5D9-988D510CFC0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A8847B-4F98-4949-8639-5CD2B411D10F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09EBDE4B-764F-4DF1-844A-BB8A52CD53EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB58A6E9-FFCF-4331-AC3B-45C37BD1943E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC5478F-A047-4F6D-BB11-0077A74C0174",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5200-32c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38D790AD-D00F-4FED-96FE-3046C827356B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5200-48y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAD9AD5C-947D-41EF-9969-FCCEB144984F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D877320D-1997-4B66-B11B-864020C755E1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5210-64c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B86047DE-A0A0-4698-9414-B66C0FA7B544",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D193BEBD-9436-468D-B89E-D5720603451D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:router_m10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F5BF9C1-F81A-487F-A748-94D6FFFEE454",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:router_m16:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD2B717B-9637-4FA3-9361-315941D95BEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:router_m20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA345A17-CB56-4252-AC1E-EDF2F91A80FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:router_m40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0960F82-AF63-4047-BB4A-44BC4A4E4B3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:router_m5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "493A0970-104C-4485-8067-973931CD6067",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_2000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF6B885A-5C17-4928-A1B9-4A729F277F4B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_2500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E5E8BD-68B9-4C94-A1F0-3F5C3EC7620A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6A2465-451A-436A-89C1-94424A0C4AB8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "641091CF-F671-4AD7-B10F-E50497AC462B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_6000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "501D212B-D846-4D43-B6D8-F01C2483AB64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "075FD895-451D-4959-9A73-94F5BB1853E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:secure_access_700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42FB27DD-D685-4D5E-8DAF-7A34DE33AB59",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B6E6B57-BFF3-4AD2-979A-B2C4FD9F138E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B52F913-266E-44CB-BFA3-85AC9D55FF1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0B57FF1-D4F8-4E28-95A7-2D29DF65D825",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t640:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12CCEFE5-F37B-482D-8670-DA40EFBB7E42",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:xre200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5542E06B-EC81-47A8-AB09-55DBE0560D1C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "2C1601BB-CAB7-4C92-8416-1824BB85D820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "14FC491D-8DA8-4E79-A9A6-3629E41C847A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "44C4BE2C-814F-49AA-8B64-17245FC01270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command \"show interfaces <> extensive\" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.",
      },
      {
         lang: "es",
         value: "Cuando se configura y aplica el ARP Policer definido por el usuario en una o más unidades de interfaz de Ethernet Agregada (AE), una vulnerabilidad de condición de carrera de tipo Time-of-check Time-of-use (TOCTOU) entre los demonios Device Control Daemon (DCD) y el proceso de firewall (dfwd) de Juniper Networks Junos OS permite a un atacante omitir el ARP Policer definido por el usuario. En este caso concreto, el ARP policer de usuario se sustituye por el ARP policer predeterminado. Para revisar los ARP Policers deseados y el estado real se puede ejecutar el comando \"show interfaces () extensive\" y revisar la salida. Vea más detalles a continuación. Un ejemplo de salida es: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ ((( incorrecto si se aplicó ARP Policer de usuario en una interfaz AE y se muestra el ARP Policer por defecto Policer: Input: jtac-arp-ae5.317-inet-arp ((( correcto si se aplicó ARP Policer de usuario en una interfaz AE Para todas las plataformas, excepto la serie SRX: Este problema afecta a Juniper Networks Junos OS: Todas las versiones 5.6R1 y todas las versiones posteriores, anteriores a 18.4 versiones anteriores a 18.4R2-S9, 18.4R3-S9 con la excepción de las versiones 15.1 15.1R7-S10 y posteriores; las versiones 19.4 anteriores a 19.4R3-S3; las versiones 20.1 anteriores a 20. 1R3; versiones 20.2 anteriores a 20.2R3-S2; 20.3 versión 20.3R1 y versiones posteriores; 20.4 versiones anteriores a 20.4R3; 21.1 versiones anteriores a 21.1R2; Este problema no afecta a versiones de Junos OS anteriores a 5.6R1. En la serie SRX, este problema afecta a Juniper Networks Junos OS: 18.4 versiones anteriores a 18.4R2-S9, 18.4R3-S9; 19.4 versiones anteriores a 19.4R3-S4; versiones 20.1 anteriores a 20.1R3; versiones 20.2 anteriores a 20.2R3-S2; 20.3 versión 20.3R1 y posteriores; 20.4 versiones anteriores a 20.4R3; 21.1 versiones anteriores a 21.1R2. Este problema no afecta a las versiones 18.4 anteriores a 18.4R1 en la serie SRX. Este problema no afecta a Junos OS Evolved",
      },
   ],
   id: "CVE-2021-0289",
   lastModified: "2024-11-21T05:42:24.760",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.9,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 5.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-07-15T20:15:10.563",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11191",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11191",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-367",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-367",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-19 01:15
Modified
2024-11-21 06:46
Summary
A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device. While JDPI correctly classifies out-of-state asymmetric TCP flows as the dynamic-application UNKNOWN, this classification is not provided to the policy module properly and hence traffic continues to use the pre-id-default-policy, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been denied. This issue only occurs when 'set security flow tcp-session no-syn-check' is configured on the device. This issue affects Juniper Networks Junos OS on SRX Series: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S8; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.
Impacted products
Vendor Product Version
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "2073B497-CCE0-4819-9B0A-E80E577BF13E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "2C1601BB-CAB7-4C92-8416-1824BB85D820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "14FC491D-8DA8-4E79-A9A6-3629E41C847A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "44C4BE2C-814F-49AA-8B64-17245FC01270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "BEF1775A-1C37-462B-B9F8-F55E0CEB73B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "92292C23-DC38-42F1-97C1-8416BBB60FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "59E2311C-075A-4C64-B614-728A21B17B1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "8120EAC3-DCCB-4429-A372-C0DAA3270A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DF81F459-915E-468C-8E82-85F1A601095B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "9912E998-75FB-4EA0-8E36-0A1C38147AB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "2849078A-447A-4615-94E1-58AF450ED22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E38CD1E2-41F5-42D1-B915-055A497C576A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "19EAC3C9-D800-436F-8FEA-8BDFB5A9BD24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "5C238EB1-5A38-4877-8849-4A6D36918B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device. While JDPI correctly classifies out-of-state asymmetric TCP flows as the dynamic-application UNKNOWN, this classification is not provided to the policy module properly and hence traffic continues to use the pre-id-default-policy, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been denied. This issue only occurs when 'set security flow tcp-session no-syn-check' is configured on the device. This issue affects Juniper Networks Junos OS on SRX Series: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S8; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en la clasificación del tráfico en el Sistema Operativo Junos de Juniper Networks en las Puertas de Enlace de Servicios de la serie SRX puede permitir a un atacante omitir las reglas de inspección profunda de paquetes de Juniper (JDPI) y acceder a redes o recursos no autorizados, cuando está habilitada la opción \"no-syn-check\" en el dispositivo. Mientras que JDPI clasifica correctamente los flujos TCP asimétricos fuera de estado como la aplicación dinámica UNKNOWN, esta clasificación no es proporcionada al módulo de políticas correctamente y, por tanto, el tráfico sigue usando la política previa al ID predeterminado, que es más permisiva, lo que causa que el firewall permita el reenvío de tráfico que debería haberse denegado. Este problema sólo es producida cuando \"set security flow tcp-session no-syn-check\" está configurado en el dispositivo. Este problema afecta al Sistema Operativo Junos de Juniper Networks en la serie SRX versiones: 18.4 versiones anteriores a 18.4R2-S10, 18.4R3-S10; 19.1 versiones anteriores a 19.1R3-S8; 19.2 versiones anteriores a 19.2R1-S8, 19.2R3-S4; versiones 19.3 anteriores a 19.3R3-S3; versiones 19.4 anteriores a 19.4R3-S5; versiones 20.1 anteriores a 20.1R3-S1; versiones 20.2 anteriores a 20.2R3-S2; versiones 20.3 anteriores a 20.3R3-S1; versiones 20.4 anteriores a 20.4R2-S2, 20.4R3; versiones 21.1 anteriores a 21.1R2-S2, 21.1R3; versiones 21.2 anteriores a 21.2R2. Este problema no afecta a versiones del Sistema Operativo Junos de Juniper Networks anteriores a 18.4R1",
      },
   ],
   id: "CVE-2022-22167",
   lastModified: "2024-11-21T06:46:18.000",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.7,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-19T01:15:08.907",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11265",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11265",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-863",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-11 16:15
Modified
2024-11-21 09:27
Summary
A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service. This issue affects Junos OS: * All versions before 21.4R3-S6, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5E63CF-31E5-4391-896F-148F05DA6BFE",
                     versionEndExcluding: "21.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C470FB4E-A927-4AF3-ACB0-AD1E264218B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "06156CD6-09D3-4A05-9C5E-BC64A70640F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "20EBC676-1B26-4A71-8326-0F892124290A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19326769-2F08-4E61-8246-CCE7AE4483F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "1379EF30-AF04-4F98-8328-52A631F24737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "EBB967BF-3495-476D-839A-9DBFCBE69F91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "1A78CC80-E8B1-4CDA-BB35-A61833657FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F1B16FF0-900F-4AEE-B670-A537139F6909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "B227E831-30FF-4BE1-B8B2-31829A5610A6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\n\n\nIf DNS Domain Generation Algorithm (DGA) detection or tunnel detection, and DNS-filtering traceoptions are configured, and specific valid transit DNS traffic is received this causes a PFE crash and restart, leading to a Denial of Service.\n\nThis issue affects Junos OS: \n  *  All versions before 21.4R3-S6,\n  *  22.2 versions before 22.2R3-S3,\n  *  22.3 versions before 22.3R3-S3,\n  *  22.4 versions before 22.4R3,\n  *  23.2 versions before 23.2R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de uso de cadena de formato controlada externamente en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS en la serie SRX permite que un atacante no autenticado basado en la red provoque una denegación de servicio (DoS). Si se configuran la detección del algoritmo de generación de dominio DNS (DGA) o la detección de túneles y las opciones de rastreo de filtrado de DNS, y se recibe tráfico DNS de tránsito válido específico, esto provoca un bloqueo y reinicio del PFE, lo que lleva a una denegación de servicio. Este problema afecta a Junos OS: * Todas las versiones anteriores a 21.4R3-S6, * Versiones 22.2 anteriores a 22.2R3-S3, * Versiones 22.3 anteriores a 22.3R3-S3, * Versiones 22.4 anteriores a 22.4R3, * Versiones 23.2 anteriores a 23.2R2.",
      },
   ],
   id: "CVE-2024-39529",
   lastModified: "2024-11-21T09:27:56.317",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
      cvssMetricV40: [
         {
            cvssData: {
               Automatable: "NOT_DEFINED",
               Recovery: "NOT_DEFINED",
               Safety: "NOT_DEFINED",
               attackComplexity: "LOW",
               attackRequirements: "NONE",
               attackVector: "NETWORK",
               availabilityRequirement: "NOT_DEFINED",
               baseScore: 8.7,
               baseSeverity: "HIGH",
               confidentialityRequirement: "NOT_DEFINED",
               exploitMaturity: "NOT_DEFINED",
               integrityRequirement: "NOT_DEFINED",
               modifiedAttackComplexity: "NOT_DEFINED",
               modifiedAttackRequirements: "NOT_DEFINED",
               modifiedAttackVector: "NOT_DEFINED",
               modifiedPrivilegesRequired: "NOT_DEFINED",
               modifiedSubAvailabilityImpact: "NOT_DEFINED",
               modifiedSubConfidentialityImpact: "NOT_DEFINED",
               modifiedSubIntegrityImpact: "NOT_DEFINED",
               modifiedUserInteraction: "NOT_DEFINED",
               modifiedVulnAvailabilityImpact: "NOT_DEFINED",
               modifiedVulnConfidentialityImpact: "NOT_DEFINED",
               modifiedVulnIntegrityImpact: "NOT_DEFINED",
               privilegesRequired: "NONE",
               providerUrgency: "NOT_DEFINED",
               subAvailabilityImpact: "LOW",
               subConfidentialityImpact: "NONE",
               subIntegrityImpact: "NONE",
               userInteraction: "NONE",
               valueDensity: "NOT_DEFINED",
               vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
               version: "4.0",
               vulnAvailabilityImpact: "HIGH",
               vulnConfidentialityImpact: "NONE",
               vulnIntegrityImpact: "NONE",
               vulnerabilityResponseEffort: "NOT_DEFINED",
            },
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-11T16:15:04.343",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA82988",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA82988",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-134",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-134",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-10-19 19:15
Modified
2024-11-21 06:05
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, responsible for traffic forwarding in SRX, which will cause a Denial of Service (DoS). Continued receipt and processing of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue can only occur when specific packets are trying to create the same session and logging for session-close is configured as a policy action. Affected platforms are: SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2. Not affected platforms are: SRX4000 Series, SRX5000 Series with SPC3, and vSRX Series. This issue affects Juniper Networks Junos OS SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2: All versions prior to 17.4R3-S5; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2.
Impacted products
Vendor Product Version
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper srx1500 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx345 -
juniper srx380 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "F0F65DCA-34B9-4CE8-91C9-426AAAEB4097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "341417EE-71C2-465C-96CA-65B2B5B63FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "A701A73D-A795-47DD-8EB5-55D1CDF67A49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*",
                     matchCriteriaId: "CC1EE8D6-8963-49D8-84C7-C9406B04D9EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s13:*:*:*:*:*:*",
                     matchCriteriaId: "03BCD35E-29D3-4F8C-ABE9-32C7010FD796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "4EC7D216-D8F3-4ABD-97C9-4C9FB6DF64FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5E327643-D8D8-4EFA-9F38-BA862A919501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "1BC6CE1C-9DD8-429E-BDC2-251D8C8674E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "63B00B4F-3E65-4CB2-807D-43908B570AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "8732E25A-9073-4C7B-9E89-C02368728EB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09255363-BF79-4FC3-AADD-5FAD0902174F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "11A24AA6-5378-4EEA-82D5-66A5F1110698",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "64CF2868-993A-48C8-8FBA-892507BBBF21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D2D5D460-EC5C-46BF-8017-CB87B45C69BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*",
                     matchCriteriaId: "1B40785E-8A3C-4087-B2B9-9A2E4BEFF421",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "B7A3FBD3-5399-42A9-9BD9-E3C981CBD6DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD361C-8B4D-43EF-8B82-9FE165D8206E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6E7539C4-6208-43EB-9A0B-4852D0CE0FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "35299B02-DC75-458D-B86D-8A0DB95B06AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC3EF2-3339-4E3C-9C6D-E854EBBDEF9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CFB29C9B-9729-43EB-AF98-AF44038DA711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2D1FB957-54C8-428E-BC8D-2802D7F6895F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A0BC4766-4BA4-4B02-A654-5C527EA66E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BB8263A9-5D63-46A2-9C98-B3980910B612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "75F125DC-3A21-489F-B324-A586F5BA350A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "6DCA0ADF-CC93-4369-95E5-B41D7301C58F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "2C1601BB-CAB7-4C92-8416-1824BB85D820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "14FC491D-8DA8-4E79-A9A6-3629E41C847A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "44C4BE2C-814F-49AA-8B64-17245FC01270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "92292C23-DC38-42F1-97C1-8416BBB60FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "59E2311C-075A-4C64-B614-728A21B17B1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "8120EAC3-DCCB-4429-A372-C0DAA3270A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, responsible for traffic forwarding in SRX, which will cause a Denial of Service (DoS). Continued receipt and processing of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue can only occur when specific packets are trying to create the same session and logging for session-close is configured as a policy action. Affected platforms are: SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2. Not affected platforms are: SRX4000 Series, SRX5000 Series with SPC3, and vSRX Series. This issue affects Juniper Networks Junos OS SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2: All versions prior to 17.4R3-S5; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de comprobación inapropiada de condiciones inusuales o excepcionales combinada con una condición de carrera en el demonio de flujo (flowd) de Juniper Networks Junos OS en las series SRX300, SRX500, SRX1500 y SRX5000 con SPC2 permite a un atacante no autenticado basado en la red enviar un tráfico específico cause un bloqueo del proceso flowd/srxpfe, responsable del reenvío de tráfico en SRX, que causará una Denegación de Servicio (DoS). La recepción y el procesamiento continuado de este tráfico específico creará una condición de Denegación de Servicio (DoS) sostenida. Este problema sólo puede producirse cuando se presentan paquetes específicos que intentan crear la misma sesión y el registro para el cierre de la sesión está configurado como una acción de política. Las plataformas afectadas son: Serie SRX300, Serie SRX500, Serie SRX1500 y Serie SRX5000 con SPC2. Las plataformas no afectadas son: Serie SRX4000, Serie SRX5000 con SPC3 y Serie vSRX. Este problema afecta a las series SRX300, SRX500, SRX1500 y SRX5000 de Juniper Networks con SPC2: Todas las versiones anteriores a 17.4R3-S5; las versiones 18.3 anteriores a 18.3R3-S5; las versiones 18.4 anteriores a 18.4R3-S9; las versiones 19.1 anteriores a 19.1R3-S6; las versiones 19.2 anteriores a 19.2R1-S7, 19.2R3-S2; las versiones 19.3 anteriores a 19. 3R2-S6, 19.3R3-S2; versiones 19.4 anteriores a 19.4R1-S4, 19.4R3-S3; versiones 20.1 anteriores a 20.1R2-S2, 20.1R3; versiones 20.2 anteriores a 20.2R3; versiones 20.3 anteriores a 20.3R2-S1, 20.3R3; versiones 20.4 anteriores a 20.4R2",
      },
   ],
   id: "CVE-2021-31364",
   lastModified: "2024-11-21T06:05:30.873",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
      ],
   },
   published: "2021-10-19T19:15:09.370",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11226",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11226",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-362",
            },
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-18 03:15
Modified
2024-11-21 06:46
Summary
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific transit traffic is processed the PFE will crash and restart. This issue affects Juniper Networks Junos OS: 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series; 22.1 versions prior to 22.1R1-S1, 22.1R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific transit traffic is processed the PFE will crash and restart. This issue affects Juniper Networks Junos OS: 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series; 22.1 versions prior to 22.1R1-S1, 22.1R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Desreferencia de Puntero NULL en Packet Forwarding Engine del Juniper Networks Junos OS en la serie SRX permite a un atacante no autenticado basado en la red causar una Denegación de Servicio (DoS). En la serie SRX, si es habilitado el Filtrado de Contenido Mejorado (CF) de la Administración Unificada de Amenazas (UTM) y es procesado un tráfico de tránsito específico, el PFE es bloqueado y es reiniciado. Este problema afecta a Juniper Networks Junos OS: Versiones 21.4 anteriores a 21.4R1-S2, 21.4R2 en la serie SRX; versiones 22.1 anteriores a 22.1R1-S1, 22.1R2 en la serie SRX. Este problema no afecta a Juniper Networks Junos OS versiones anteriores a 21.4R1",
      },
   ],
   id: "CVE-2022-22232",
   lastModified: "2024-11-21T06:46:26.920",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-18T03:15:10.340",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69886",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69886",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEF1C9AB-1107-4A26-BB84-BDD72B4E6564",
                     versionEndExcluding: "19.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "1BBF56BB-939A-4E38-BD9E-E3198E70F8E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "5C238EB1-5A38-4877-8849-4A6D36918B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D621DB7F-BC6B-4A07-8803-596B3ED11CF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A5620596-4DEE-41D7-A63F-224D814DAA77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A8BBCEC0-5915-4F69-90FD-070A94145BB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D3C93B13-DCEB-4861-87DC-3F1ECBAF7FFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E5E3FDB-3F33-4686-9B64-0152AD41939D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "7B798133-105C-448B-B06E-57327E44E478",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent \"deterministic NAT\" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Unchecked Input for Loop Condition en una librería NAT de Juniper Networks Junos OS permite que un atacante autenticado local con privilegios bajos provoque una denegación de servicio (DoS). Cuando hay una configuración \"NAT determinista\" inconsistente en un SRX o MX con SPC3 y luego se emite un comando CLI específico, el SPC fallará y se reiniciará. La ejecución repetida de este comando provocará una DoS sostenida. Esta configuración se caracteriza por que el número total de bloques de puertos es mayor que el número total de hosts. Un ejemplo de dicha configuración es: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] donde de acuerdo con el siguiente cálculo: 65536-1024=64512 (número de puertos utilizables por dirección IP, implícito) 64512/1008=64 ( número de bloques de puertos por IP Nat) xxx0/32 a xxx15/32 = 16 (direcciones IP NAT disponibles en el grupo NAT) bloques de puertos totales en el grupo NAT = 64 bloques por IP * 16 IP = 1024 Dirección de host de bloques de puertos yyy0/24 = 256 hosts (con direcciones de límite incluidas) Si el tamaño del bloque de puerto está configurado para ser 4032, entonces el total de bloques de puerto es (64512/4032) * 16 = 256, lo que equivale al total de direcciones de host de 256, y el problema no será visto. Este problema afecta a Juniper Networks Junos OS en la serie SRX y la serie MX con SPC3: todas las versiones anteriores a 19.4R3-S10; 20.1 versión 20.1R1 y versiones posteriores; Versiones 20.2 anteriores a 20.2R3-S6; Versiones 20.3 anteriores a 20.3R3-S6; Versiones 20.4 anteriores a 20.4R3-S5; Versiones 21.1 anteriores a 21.1R3-S4; Versiones 21.2 anteriores a 21.2R3-S3; Versiones 21.3 anteriores a 21.3R3-S3; Versiones 21.4 anteriores a 21.4R3-S1; Versiones 22.1 anteriores a 22.1R2-S2, 22.1R3; Versiones 22.2 anteriores a 22.2R2.",
      },
   ],
   id: "CVE-2023-22409",
   lastModified: "2024-11-21T07:44:45.620",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:11.233",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70205",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70205",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all MX Series and SRX Series platform, when H.323 ALG is enabled and specific H.323 packets are received simultaneously, a flow processing daemon (flowd) crash will occur. Continued receipt of these specific packets will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEF1C9AB-1107-4A26-BB84-BDD72B4E6564",
                     versionEndExcluding: "19.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "1BBF56BB-939A-4E38-BD9E-E3198E70F8E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E5E3FDB-3F33-4686-9B64-0152AD41939D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "7B798133-105C-448B-B06E-57327E44E478",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all MX Series and SRX Series platform, when H.323 ALG is enabled and specific H.323 packets are received simultaneously, a flow processing daemon (flowd) crash will occur. Continued receipt of these specific packets will cause a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series All versions prior to 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de escritura fuera de los límites en el ALG H.323 de Juniper Networks Junos OS permite que un atacante basado en red no autenticado provoque una denegación de servicio (DoS). En todas las plataformas de las series MX y SRX, cuando H.323 ALG está habilitado y se reciben paquetes H.323 específicos simultáneamente, se producirá una falla del Flow Processing Daemon (flowd). La recepción continua de estos paquetes específicos provocará una condición sostenida de Denegación de Servicio (DoS). Este problema afecta a: Juniper Networks Junos OS en las series MX y SRX. Todas las versiones anteriores a 19.4R3-S10; Versiones 20.2 anteriores a 20.2R3-S6; Versiones 20.3 anteriores a 20.3R3-S6; Versiones 20.4 anteriores a 20.4R3-S5; Versiones 21.1 anteriores a 21.1R3-S4; Versiones 21.2 anteriores a 21.2R3-S3; Versiones 21.3 anteriores a 21.3R3-S3; Versiones 21.4 anteriores a 21.4R3; Versiones 22.1 anteriores a 22.1R2-S1, 22.1R3; Versiones 22.2 anteriores a 22.2R1-S2, 22.2R2.",
      },
   ],
   id: "CVE-2023-22415",
   lastModified: "2024-11-21T07:44:46.423",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:11.680",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70211",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70211",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-14 16:15
Modified
2024-11-21 06:46
Summary
A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated attacker to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwarding. Continued receipt and processing of this specific packet will create a sustained DoS condition. This issue only affects SRX Series when 'preserve-incoming-fragment-size' feature is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS prior to 17.3R1.
Impacted products
Vendor Product Version
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*",
                     matchCriteriaId: "1B40785E-8A3C-4087-B2B9-9A2E4BEFF421",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "B7A3FBD3-5399-42A9-9BD9-E3C981CBD6DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD361C-8B4D-43EF-8B82-9FE165D8206E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6E7539C4-6208-43EB-9A0B-4852D0CE0FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "35299B02-DC75-458D-B86D-8A0DB95B06AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC3EF2-3339-4E3C-9C6D-E854EBBDEF9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CFB29C9B-9729-43EB-AF98-AF44038DA711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2D1FB957-54C8-428E-BC8D-2802D7F6895F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A0BC4766-4BA4-4B02-A654-5C527EA66E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BB8263A9-5D63-46A2-9C98-B3980910B612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "75F125DC-3A21-489F-B324-A586F5BA350A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A2298BFC-597D-4A74-8E9A-7AAFAB84B852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "2C1601BB-CAB7-4C92-8416-1824BB85D820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "14FC491D-8DA8-4E79-A9A6-3629E41C847A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "44C4BE2C-814F-49AA-8B64-17245FC01270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "BEF1775A-1C37-462B-B9F8-F55E0CEB73B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "92292C23-DC38-42F1-97C1-8416BBB60FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "8120EAC3-DCCB-4429-A372-C0DAA3270A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DF81F459-915E-468C-8E82-85F1A601095B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "2849078A-447A-4615-94E1-58AF450ED22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E38CD1E2-41F5-42D1-B915-055A497C576A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "19EAC3C9-D800-436F-8FEA-8BDFB5A9BD24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "5C238EB1-5A38-4877-8849-4A6D36918B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D621DB7F-BC6B-4A07-8803-596B3ED11CF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated attacker to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwarding. Continued receipt and processing of this specific packet will create a sustained DoS condition. This issue only affects SRX Series when 'preserve-incoming-fragment-size' feature is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect Juniper Networks Junos OS prior to 17.3R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en Juniper Networks Junos OS on SRX Series, permite a un atacante no autenticado basado en la red causar una Denegación de Servicio (DoS) mediante el envío de un paquete fragmentado específico al dispositivo, resultando en un bloqueo del proceso flowd, que es responsable del reenvío de paquetes. La recepción y el procesamiento continuado de este paquete específico creará una condición de denegación de servicio sostenida. Este problema sólo afecta a la serie SRX cuando la funcionalidad \"preserve-incoming-fragment-size\" está habilitada. Este problema afecta a Juniper Networks Junos OS on SRX Series: 18.3 versiones anteriores a 18.3R3-S6; 18.4 versiones anteriores a 18.4R3-S10; 19.1 versiones anteriores a 19.1R3-S7; 19.2 versiones anteriores a 19.2R3-S4; 19.3 versiones anteriores a 19.3R3-S4; 19.4 versiones anteriores a 19.4R3-S6; 20. 1 versiones anteriores a 20.1R3-S2; 20.2 versiones anteriores a 20.2R3-S3; 20.3 versiones anteriores a 20.3R3-S1; 20.4 versiones anteriores a 20.4R3; 21.1 versiones anteriores a 21.1R2-S1, 21.1R3; 21.2 versiones anteriores a 21.2R2. Este problema no afecta al sistema operativo Junos de Juniper Networks versiones anteriores a 17.3R1",
      },
   ],
   id: "CVE-2022-22185",
   lastModified: "2024-11-21T06:46:20.703",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-14T16:15:07.930",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69493",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69493",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-25 23:15
Modified
2024-11-21 08:54
Summary
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper ex_redundant_power_system -
juniper ex_rps -
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-24mp -
juniper ex2300-24p -
juniper ex2300-24t -
juniper ex2300-48mp -
juniper ex2300-48p -
juniper ex2300-48t -
juniper ex2300-c -
juniper ex2300_multigigabit -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4100 -
juniper ex4100-f -
juniper ex4100_multigigabit -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300_multigigabit -
juniper ex4300m -
juniper ex4400 -
juniper ex4400-24x -
juniper ex4400_multigigabit -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx1600 -
juniper srx210 -
juniper srx220 -
juniper srx2300 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4300 -
juniper srx4600 -
juniper srx4700 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C445622E-8E57-4990-A71A-E1993BFCB91A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C470FB4E-A927-4AF3-ACB0-AD1E264218B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "9D157211-535E-4B2D-B2FE-F697FAFDF65C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EFF72FCA-C440-4D43-9BDB-F712DB413717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "DE69E9E3-00FC-41BF-9109-617668CF9A0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "06156CD6-09D3-4A05-9C5E-BC64A70640F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "20EBC676-1B26-4A71-8326-0F892124290A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "1379EF30-AF04-4F98-8328-52A631F24737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "EBB967BF-3495-476D-839A-9DBFCBE69F91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7E5688D6-DCA4-4550-9CD1-A3D792252129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "1A78CC80-E8B1-4CDA-BB35-A61833657FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F1B16FF0-900F-4AEE-B670-A537139F6909",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "B227E831-30FF-4BE1-B8B2-31829A5610A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "BE8A5BA3-87BD-473A-B229-2AAB2C797005",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex_redundant_power_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFE03C4A-3FA7-43FC-8801-4F1566B54388",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex_rps:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42877394-A0A1-4136-A1D3-D287BFCC85E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3A0D9C0-34D3-430F-ABFA-B68010A8825D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E04B126-F290-4242-BB80-5F573D623E6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "671D9977-7657-48C7-A07C-4AED54380A86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E100C3C-070D-4132-927F-756538B91491",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2032E7DD-96FD-48B7-922C-5FE04675796C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D907D6A-B7C4-4A10-AA58-0F908575A435",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "332F4692-7E33-4FB6-9DE2-09E0A0068DB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2521C83-E8F2-4621-9727-75BB3FC11E64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F496D19-D28C-4517-90A3-90EC62BC5D79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4100_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC6E4532-5DD9-45D4-996A-37C7E5742856",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B410BA4-181A-4241-A95E-2238CE1627A3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400-24x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EEC1C95-E6B2-4364-88AD-C69EC00353FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D77FA1A-4B09-4184-A03E-AE4831C9BBAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator.\n\nA specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives.\n\nThis issue affects Juniper Networks Junos OS on SRX Series and EX Series:\n  *  All versions earlier than 20.4R3-S10;\n  *  21.2 versions earlier than 21.2R3-S8;\n  *  21.4 versions earlier than 21.4R3-S6;\n  *  22.1 versions earlier than 22.1R3-S5;\n  *  22.2 versions earlier than 22.2R3-S3;\n  *  22.3 versions earlier than 22.3R3-S2;\n  *  22.4 versions earlier than 22.4R3-S1;\n  *  23.2 versions earlier than 23.2R2;\n  *  23.4 versions earlier than 23.4R2.\n\n\n",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de neutralización incorrecta de la entrada durante la generación de páginas web ('Cross-site Scripting') en J-Web de Juniper Networks Junos OS en las series SRX y EX permite a un atacante construir una URL que, cuando la visita otro usuario, le permite ejecutar comandos con los permisos del objetivo, incluido un administrador. Una invocación específica del método emit_debug_note en webauth_operation.php devolverá los datos que recibe. Este problema afecta a Juniper Networks Junos OS en las series SRX y EX: * Todas las versiones anteriores a 20.4R3-S10; * Versiones 21.2 anteriores a 21.2R3-S8; * Versiones 21.4 anteriores a 21.4R3-S6; * Versiones 22.1 anteriores a 22.1R3-S5; * Versiones 22.2 anteriores a 22.2R3-S3; * Versiones 22.3 anteriores a 22.3R3-S2; * Versiones 22.4 anteriores a 22.4R3-S1; * Versiones 23.2 anteriores a 23.2R2; * Versiones 23.4 anteriores a 23.4R2.",
      },
   ],
   id: "CVE-2024-21620",
   lastModified: "2024-11-21T08:54:44.457",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-25T23:15:09.680",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA76390",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA76390",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-14 16:15
Modified
2024-11-21 06:46
Summary
An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1.
References



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Acceso de Puntero no Inicializado en la SIP ALG de Juniper Networks Junos OS permite a un atacante no autenticado basado en la red causar una Denegación de Servicio (DoS). La recepción continuada de estos paquetes específicos causará una condición de denegación de servicio sostenida. En todas las plataformas MX y SRX, si la ALG de SIP está habilitada, un MS-MPC o MS-MIC, o SPC será bloqueado si recibe un mensaje SIP con un formato de encabezado de contacto específico. Este problema afecta a Juniper Networks Junos OS en las series MX y SRX: versiones 20.4 anteriores a 20.4R3; versiones 21.1 anteriores a 21.1R2-S1, 21.1R3; versiones 21.2 anteriores a 21.2R2. Este problema no afecta a versiones anteriores a 20.4R1",
      },
   ],
   id: "CVE-2022-22198",
   lastModified: "2024-11-21T06:46:22.510",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-14T16:15:08.653",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69513",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69513",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-10-10 18:29
Modified
2024-11-21 03:37
Summary
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.
Impacted products
Vendor Product Version
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.3x48
juniper junos 12.3x48
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -
juniper junos 12.3
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2x75
juniper junos 18.2x75
juniper junos 18.2x75
juniper junos 14.1x53
juniper ex2200 -
juniper ex2200-vc -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex4200 -
juniper ex4300 -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4600 -
juniper ex6200 -
juniper ex8200 -
juniper ex8200-vc -
juniper qfx3500 -
juniper qfx3600 -
juniper qfx5100 -
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.2
juniper srx100 -
juniper srx110 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx345 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx550m -
juniper srx650 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper qfx5110 -
juniper qfx5200 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper nfx150 -
juniper nfx250 -
juniper junos 15.1x53
juniper qfx10000 -
juniper qfx10002 -
juniper qfx10002-32q -
juniper qfx10002-60c -
juniper qfx10002-72q -
juniper qfx10008 -
juniper qfx10016 -
juniper junos 15.1x53
juniper ex2300 -
juniper ex3400 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*",
                     matchCriteriaId: "090BB276-C169-4A41-B03D-0EC40D20E8BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*",
                     matchCriteriaId: "51732A2B-52E2-4356-8409-5CB6D79F23DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*",
                     matchCriteriaId: "6A793CCD-397E-45DA-9349-D01C69AB96D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*",
                     matchCriteriaId: "B6C38637-ABE0-419A-A053-CBE076766551",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
                     matchCriteriaId: "B63EF1C6-C859-4EFA-81BE-1E5AD3364B25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
                     matchCriteriaId: "4D9134BF-7289-4503-A9C5-977C4CDCD108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2698D906-6D9D-429C-9ECC-46FF2334C637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
                     matchCriteriaId: "BD332D86-5DA7-49A4-98C3-E4D946832DC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
                     matchCriteriaId: "6BFFAC38-5D41-4BDB-B9D4-579F104A61BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C7620D01-1A6B-490F-857E-0D803E0AEE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
                     matchCriteriaId: "03B09A78-9DEA-43A7-8DD6-56D94869DAEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "18B1A6D6-EB40-461A-87B0-FD777019E1BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "F8CD62D3-0894-426E-80A8-CEBCBD49810F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
                     matchCriteriaId: "08FC0245-A4FF-42C0-A236-8569301E351A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
                     matchCriteriaId: "A68E7711-C7B9-4578-AB7B-863F088A38BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E0501706-CB27-42B6-916B-B0009EC333C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
                     matchCriteriaId: "41E43503-A694-406E-B95A-689E4167A4FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A464B371-1B8B-4563-8728-969825896115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "120EA9E3-788B-4CFD-A74F-17111FFD0131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "6B4C2FBB-FEA0-4B98-8568-705FFFFFBB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "B2506FCC-4B0F-4FEF-A44E-0C704B6217F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "9D9F2F31-B378-40FE-B012-000A225B76F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D014FF7B-BBEA-4F80-BE0E-4C70E4585A1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "C8257676-7AA7-4B39-A8F8-685843D0685B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "31001EA8-2C65-4D3D-AEC7-F298692E8752",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
                     matchCriteriaId: "33A3ECF9-AA4D-41F9-8441-1EB5F1DB882E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "F2E0A48F-C85B-4973-A054-28A888EA5ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "6D3E38C1-808C-4BD3-993D-F30855F5390F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1FD11073-DC27-41F8-A6A2-7E22A062D14E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
                     matchCriteriaId: "2A78389E-868C-422D-9AA3-8A672DF6C2AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
                     matchCriteriaId: "85BFC22F-A6B3-4306-A28B-5D78FFA6402D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
                     matchCriteriaId: "99276E50-825C-4BB4-8496-1F81BDA21655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "22B700C1-C690-4C7D-A5AE-45BBB550D52F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "50DDDE48-3F73-440F-82ED-BD9D62A407B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
                     matchCriteriaId: "C88635DB-09B1-4DA1-8FC3-2F7A7E42819C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "92F35C19-5AD2-4F98-8313-2E880714DF3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "DF5A9D31-ED7D-4390-B46D-7E46089DB932",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3BE0AD25-767F-4719-9BE4-C8BDF78A6C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "19684897-77CE-4E50-B9D2-25E6114E66A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "6B4A4960-0241-4BF4-8857-8B7BE33466B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "8008342F-4BF3-49D8-B516-C08AAF9E469E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5B6097D4-3856-4696-9A26-5B6C0FD9AD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84DD80BF-BF7E-447B-AA74-00B3D8036E36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "D8A72B62-E3B7-42FA-980F-75BDF15236FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "57B89EEB-222D-46AA-BC8F-4EE7E17BA7B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "ECAE613D-1317-4D2E-8A61-980CD5DEAED8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "BAB2D63C-C966-42CA-85A9-09820D00A2D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "3DE6E051-2F2F-4862-9001-5DA83C4BCF75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "B9695B3E-FCDA-4DF0-B714-8B4F87AA647D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "36214C23-82C8-4A3E-9FF8-04F85FF8B2B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9990301C-9D79-4372-8EC6-71A209B0C0D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "95473197-2553-4252-B5E5-CAF904C2EA6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2x75:d100:*:*:*:*:*:*",
                     matchCriteriaId: "21ED0B18-9767-4499-A8D5-A54502CA7744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:*",
                     matchCriteriaId: "12ED835F-FCE5-4796-9833-5FA240909ACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2x75:d5:*:*:*:*:*:*",
                     matchCriteriaId: "94667657-E6B9-4245-A30C-3A51202E7551",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:*",
                     matchCriteriaId: "E77B6650-6316-41D1-9EA3-4429DD972628",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A336BD3-4AB0-4E9E-8AD5-E6413A5A53FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F4D44B0-E6CE-4380-8712-AC832DBCB424",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E974B4BC-64C5-4BB6-AF31-D46AF3763416",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
                     matchCriteriaId: "40D42ACF-860C-4B47-8E25-7DEC30FB8064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
                     matchCriteriaId: "C808E08F-1992-43DD-A106-E920DC784831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "267A3603-BC18-442E-803A-4CAEB6493433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "25C7C3D0-A203-4979-8375-A610ADD48E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6F4C1-6A7E-474F-89BC-7A3C50FD8CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84F5BCBA-404B-4BC9-B363-CE6D231B0D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18A4CA3E-DA61-49CC-8476-3A476CCB2B83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:*",
                     matchCriteriaId: "E773AA7F-AB97-488A-B73D-682FB5553B31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d234:*:*:*:*:*:*",
                     matchCriteriaId: "E9196882-FE7B-489A-81AC-55355864DA93",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A8847B-4F98-4949-8639-5CD2B411D10F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC5478F-A047-4F6D-BB11-0077A74C0174",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:*",
                     matchCriteriaId: "ABA63850-E536-4E2E-BFDD-7BDBB965BDB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:*",
                     matchCriteriaId: "5582D0E6-292E-487B-9DAC-143D5D1C0D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*",
                     matchCriteriaId: "723FD85C-C763-4017-B6BF-0CA707997D2A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9AE81FA-B0F3-4F0B-A2D1-2BB590345058",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EB08A27-7777-4538-ADC4-9D2F89963C13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:*",
                     matchCriteriaId: "60D515B2-9747-465B-8854-887C6FDA8743",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF2039C-E08C-472F-82E6-DAD3F94724B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1401145-D8EC-4DB9-9CDE-9DE6C0D000C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17E59530-3262-4BDC-915C-0B8D2EED7784",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "626CA614-72D4-4A8B-9C38-275C7A7F8D85",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0FF30F4-3D10-4AD6-9643-5826A11C7629",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1453E42A-77B3-4922-8EC3-1A5668C39550",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26408465-BD6A-4416-B98E-691A5F651080",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:*",
                     matchCriteriaId: "92E31AF0-83EB-4570-A6DE-4308BE0D3A43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de desreferencia de puntero NULL en Juniper Networks Junos OS permite que un atacante provoque que el kernel de Junos OS se cierre inesperadamente. La recepción continuada de este paquete MPLS especialmente manipulado provocará una condición sostenida de denegación de servicio (DoS). Este problema requiere que se reciba en una interfaz configurada para recibir este tipo de tráfico. Las versiones afectadas son Juniper Networks Junos OS: 12.1X46 a partir de la versión 12.1X46-D76 anterior a la 12.1X46-D81 en SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 12.3R12-S10; 12.3X48 a partir de la versión 12.3X48-D66 anterior a la 12.3X48-D75 en SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 14.1X53-D47 en EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 a partir de la versión 14.1X53-D115 anterior a la 14.1X53-D130 en QFabric System; 15.1 a partir de la versión 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 a partir de la versión 15.1R7 anterior a la 15.1R7-S2; 15.1X49 a partir de la versión 15.1X49-D131 anterior a la 15.1X49-D150 en SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 15.1X53 a partir de la versión 15.1X53-D233 (no incluida) anterior a la 15.1X53-D235 en QFX5200/QFX5110; 15.1X53 hasta la versión 15.1X53-D471 anterior a la 15.1X53-D590 en NFX150, NFX250; 15.1X53-D67 en QFX10000 Series; 15.1X53-D59 en EX2300/EX3400; 16.1 a partir de la versión 16.1R3-S8; 16.1 a partir de la versión 16.1R4-S9 anterior a la 16.1R4-S12; 16.1 a partir de la versión 16.1R5-S4; 16.1 a partir de la versión 16.1R6-S3 anterior a la 16.1R6-S6; 16.1 a partir de la versión 16.1R7 anterior a la 16.1R7-S2; 16.2 a partir de la versión 16.2R1-S6; 16.2 a partir de la versión 16.2R2-S5 anterior a la 16.2R2-S7; 17.1R1-S7; 17.1 a partir de la versión 17.1R2-S7 anterior a la 17.1R2-S9; 17.2R1-S6; 17.2 a partir de la versión 17.2R2-S4 anterior a la 17.2R2-S6; 17.2X75 a partir de la versión 17.2X75-D100 anterior a la X17.2X75-D101, 17.2X75-D110; 17.3 a partir de la versión 17.3R1-S4 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 17.3 a partir de la versión 17.3R2-S2 anterior a la 17.3R2-S4 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 17.3R3 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 17.4 a partir de la versión 17.4R1-S3 anterior a la 17.4R1-S5 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 17.4R2 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 18.1 a partir de la versión 18.1R2 anterior a la 18.1R2-S3, 18.1R3 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX; 18.2 a partir de la versión 18.2R1 anterior a la 18.2R1-S2, 18.2R1-S3, 18.2R2 en todos los non-SRX Series y SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 y vSRX y 18.2X75 a partir de la versión 18.2X75-D5 anterior a la 18.2X75-D20.",
      },
   ],
   id: "CVE-2018-0049",
   lastModified: "2024-11-21T03:37:25.997",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-10-10T18:29:02.030",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105701",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041850",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA10883",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/KB30092",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105701",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041850",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA10883",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/KB30092",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-12 15:15
Modified
2025-04-10 20:44
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the IKE daemon (iked) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an administratively adjacent attacker which is able to successfully establish IPsec tunnels to cause a Denial of Service (DoS). If specific values for the IPsec parameters local-ip, remote-ip, remote ike-id, and traffic selectors are sent from the peer, a memory leak occurs during every IPsec SA rekey which is carried out with a specific message sequence. This will eventually result in an iked process crash and restart. The iked process memory consumption can be checked using the below command:   user@host> show system processes extensive | grep iked           PID USERNAME   PRI NICE   SIZE   RES   STATE   C TIME WCPU COMMAND           56903 root       31   0     4016M 2543M CPU0   0 2:10 10.50% iked This issue affects Juniper Networks Junos OS: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S4; * 22.1 versions earlier than 22.1R3-S3; * 22.2 versions earlier than 22.2R3-S2; * 22.3 versions earlier than 22.3R3; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R1-S2, 23.2R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.2
juniper csrx -
juniper mx240 -
juniper mx480 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx1600 -
juniper srx210 -
juniper srx220 -
juniper srx2300 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4300 -
juniper srx4600 -
juniper srx4700 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -
juniper vsrx -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C445622E-8E57-4990-A71A-E1993BFCB91A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "9D157211-535E-4B2D-B2FE-F697FAFDF65C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "06156CD6-09D3-4A05-9C5E-BC64A70640F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "20EBC676-1B26-4A71-8326-0F892124290A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "1379EF30-AF04-4F98-8328-52A631F24737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "EBB967BF-3495-476D-839A-9DBFCBE69F91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "1A78CC80-E8B1-4CDA-BB35-A61833657FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F1B16FF0-900F-4AEE-B670-A537139F6909",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B10DFCE-5331-4D79-8D9F-EF84743493D3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Release of Memory after Effective Lifetime vulnerability in the IKE daemon (iked) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an administratively adjacent attacker which is able to successfully establish IPsec tunnels to cause a Denial of Service (DoS).\n\nIf specific values for the IPsec parameters local-ip, remote-ip, remote ike-id, and traffic selectors are sent from the peer, a memory leak occurs during every IPsec SA rekey which is carried out with a specific message sequence. This will eventually result in an iked process crash and restart.\n\nThe iked process memory consumption can be checked using the below command:\n  user@host> show system processes extensive | grep iked\n           PID   USERNAME     PRI  NICE    SIZE    RES    STATE    C   TIME  WCPU COMMAND\n           56903 root         31    0      4016M  2543M   CPU0     0   2:10  10.50% iked\n\nThis issue affects Juniper Networks Junos OS:\n  *  All versions earlier than 20.4R3-S9;\n  *  21.2 versions earlier than 21.2R3-S7;\n  *  21.3 versions earlier than 21.3R3-S5;\n  *  21.4 versions earlier than 21.4R3-S4;\n  *  22.1 versions earlier than 22.1R3-S3;\n  *  22.2 versions earlier than 22.2R3-S2;\n  *  22.3 versions earlier than 22.3R3;\n  *  22.4 versions earlier than 22.4R3;\n  *  23.2 versions earlier than 23.2R1-S2, 23.2R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de liberación de memoria faltante después de la vida útil efectiva en el daemon IKE (iked) de Juniper Networks Junos OS en la serie MX con SPC3 y la serie SRX permite que un atacante administrativamente adyacente que pueda establecer con éxito túneles IPsec provoque una denegación de servicio ( DoS). Si el par envía valores específicos para los parámetros IPsec local-ip, remoto-ip, remoto ike-id y selectores de tráfico, se produce una pérdida de memoria durante cada nueva clave de IPsec SA que se lleva a cabo con una secuencia de mensajes específica. Esto eventualmente resultará en un bloqueo y reinicio del proceso iked. El consumo de memoria del proceso iked se puede verificar usando el siguiente comando: usuario@host&gt; mostrar procesos del sistema extensos | grep iked PID NOMBRE DE USUARIO PRI NICE TAMAÑO RES ESTADO C HORA WCPU COMANDO 56903 root 31 0 4016M 2543M CPU0 0 2:10 10,50% iked Este problema afecta a Juniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S9; * Versiones 21.2 anteriores a 21.2R3-S7; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R3; * Versiones 22.4 anteriores a 22.4R3; * Versiones 23.2 anteriores a 23.2R1-S2, 23.2R2.",
      },
   ],
   id: "CVE-2024-21609",
   lastModified: "2025-04-10T20:44:13.873",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
      cvssMetricV40: [
         {
            cvssData: {
               Automatable: "NOT_DEFINED",
               Recovery: "NOT_DEFINED",
               Safety: "NOT_DEFINED",
               attackComplexity: "LOW",
               attackRequirements: "NONE",
               attackVector: "ADJACENT",
               availabilityRequirement: "NOT_DEFINED",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityRequirement: "NOT_DEFINED",
               exploitMaturity: "NOT_DEFINED",
               integrityRequirement: "NOT_DEFINED",
               modifiedAttackComplexity: "NOT_DEFINED",
               modifiedAttackRequirements: "NOT_DEFINED",
               modifiedAttackVector: "NOT_DEFINED",
               modifiedPrivilegesRequired: "NOT_DEFINED",
               modifiedSubAvailabilityImpact: "NOT_DEFINED",
               modifiedSubConfidentialityImpact: "NOT_DEFINED",
               modifiedSubIntegrityImpact: "NOT_DEFINED",
               modifiedUserInteraction: "NOT_DEFINED",
               modifiedVulnAvailabilityImpact: "NOT_DEFINED",
               modifiedVulnConfidentialityImpact: "NOT_DEFINED",
               modifiedVulnIntegrityImpact: "NOT_DEFINED",
               privilegesRequired: "NONE",
               providerUrgency: "NOT_DEFINED",
               subAvailabilityImpact: "LOW",
               subConfidentialityImpact: "NONE",
               subIntegrityImpact: "NONE",
               userInteraction: "NONE",
               valueDensity: "NOT_DEFINED",
               vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
               version: "4.0",
               vulnAvailabilityImpact: "HIGH",
               vulnConfidentialityImpact: "NONE",
               vulnIntegrityImpact: "NONE",
               vulnerabilityResponseEffort: "NOT_DEFINED",
            },
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-12T15:15:23.770",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://supportportal.juniper.net/JSA75750",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Not Applicable",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://supportportal.juniper.net/JSA75750",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 15:15
Modified
2024-11-21 06:46
Summary
An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the "request ..." or "show system download ..." commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper ex_redundant_power_system -
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-c -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300m -
juniper ex4400 -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "666B9482-B9DD-4373-8CC3-06A55B06FE5B",
                     versionEndExcluding: "19.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "2849078A-447A-4615-94E1-58AF450ED22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C2C625B6-25ED-4F6C-A778-6AB7FA7901CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E38CD1E2-41F5-42D1-B915-055A497C576A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "0C816B9A-F152-4E5F-8152-73635840A89A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "19EAC3C9-D800-436F-8FEA-8BDFB5A9BD24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "5C238EB1-5A38-4877-8849-4A6D36918B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D621DB7F-BC6B-4A07-8803-596B3ED11CF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A5620596-4DEE-41D7-A63F-224D814DAA77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A8BBCEC0-5915-4F69-90FD-070A94145BB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex_redundant_power_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFE03C4A-3FA7-43FC-8801-4F1566B54388",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the \"request ...\" or \"show system download ...\" commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Neutralización Inapropiada de Elementos Especiales en el administrador de descargas del Sistema Operativo Junos de Juniper Networks en las series SRX y EX permite a un atacante autenticado localmente con bajos privilegios tomar el control total del dispositivo. Uno de los aspectos de esta vulnerabilidad es que el atacante debe ser capaz de ejecutar cualquiera de los comandos \"request ...\" o \"show system download ...\". Este problema afecta al Sistema Operativo Junos de Juniper Networks en las series SRX y EX: Todas las versiones anteriores a 19.2R1-S9, 19.2R3-S5; las versiones 19.3 anteriores a 19.3R3-S6; las versiones 19.4 anteriores a 19.4R3-S8; las versiones 20.1 anteriores a 20.1R3-S4; las versiones 20.2 anteriores a 20.2R3-S4; las versiones 20.3 anteriores a 20. 3R3-S3; 20.4 versiones anteriores a 20.4R3-S2, 20.4R3-S3; 21.1 versiones anteriores a 21.1R3-S1; 21.2 versiones anteriores a 21.2R2-S2, 21.2R3; 21.3 versiones anteriores a 21.3R2, 21.3R3; 21.4 versiones anteriores a 21.4R1-S1, 21.4R2",
      },
   ],
   id: "CVE-2022-22221",
   lastModified: "2024-11-21T06:46:25.550",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-20T15:15:09.123",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69725",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69725",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 15:15
Modified
2024-11-21 06:46
Summary
A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.
References
sirt@juniper.nethttps://kb.juniper.net/JSA69710Mailing List, Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.juniper.net/JSA69710Mailing List, Mitigation, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Buffer Overflow vulnerability in the PFE of Juniper Networks Junos OS on SRX series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search feature of UTM (Unified Threat management). Continued receipt of this specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 20.2 versions prior to 20.2R3-S4 on SRX Series; 20.3 versions prior to 20.3R3-S3 on SRX Series; 20.4 versions prior to 20.4R3-S3 on SRX Series; 21.1 versions prior to 21.1R3-S1 on SRX Series; 21.2 versions prior to 21.2R2-S2, 21.2R3 on SRX Series; 21.3 versions prior to 21.3R2 on SRX Series; 21.4 versions prior to 21.4R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de desbordamiento del búfer en el PFE del Sistema Operativo Junos de Juniper Networks en la serie SRX permite a un atacante no autenticado basado en la red causar una Denegación de Servicio (DoS). El PFE será bloqueado cuando un tráfico específico sea analizado por la función de búsqueda segura Enhanced Web Filtering de UTM (Unified Threat management). La recepción continuada de este tráfico específico creará una condición de Denegación de Servicio (DoS) sostenida. Este problema afecta al Sistema Operativo Junos de Juniper Networks: 20.2 versiones anteriores a 20.2R3-S4 en la serie SRX; 20.3 versiones anteriores a 20.3R3-S3 en la serie SRX; 20.4 versiones anteriores a 20.4R3-S3 en la serie SRX; 21.1 versiones anteriores a 21.1R3-S1 en la serie SRX; 21.2 versiones anteriores a 21.2R2-S2, 21.2R3 en la serie SRX; 21.3 versiones anteriores a 21.3R2 en la serie SRX; 21.4 versiones anteriores a 21.4R2 en la serie SRX. Este problema no afecta a versiones del Sistema Operativo Junos de Juniper Networks anteriores a 20.2R1",
      },
   ],
   id: "CVE-2022-22206",
   lastModified: "2024-11-21T06:46:23.443",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-20T15:15:08.517",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Mailing List",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69710",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69710",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-18 03:15
Modified
2024-11-21 06:46
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based, attacker to cause Denial of Service (DoS). A PFE crash will happen when a GPRS Tunnel Protocol (GTP) packet is received with a malformed field in the IP header of GTP encapsulated General Packet Radio Services (GPRS) traffic. The packet needs to match existing state which is outside the attackers control, so the issue cannot be directly exploited. The issue will only be observed when endpoint address validation is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.
Impacted products
Vendor Product Version
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based, attacker to cause Denial of Service (DoS). A PFE crash will happen when a GPRS Tunnel Protocol (GTP) packet is received with a malformed field in the IP header of GTP encapsulated General Packet Radio Services (GPRS) traffic. The packet needs to match existing state which is outside the attackers control, so the issue cannot be directly exploited. The issue will only be observed when endpoint address validation is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Comprobación Inapropiada de Condiciones Inusuales o Excepcionales en Packet Forwarding Engine (PFE) del Juniper Networks Junos OS en la serie SRX permite a un atacante no autenticado, basado en la red, causar una Denegación de Servicio (DoS). Un bloqueo del PFE es producido cuando es recibido un paquete del protocolo de túnel GPRS (GTP) con un campo malformado en la cabecera IP del tráfico de servicios generales de radio por paquetes (GPRS) encapsulado por GTP. El paquete debe coincidir con el estado existente, lo que está fuera del control de los atacantes, por lo que el problema no puede ser explotado directamente. El problema sólo será observado cuando la comprobación de la dirección del endpoint esté habilitada. Este problema afecta a Juniper Networks Junos OS en la serie SRX: versiones 20.2 anteriores a 20.2R3-S5; versiones 20.3 anteriores a 20.3R3-S4; versiones 20.4 anteriores a 20.4R3-S3; versiones 21. 1 versiones anteriores a 21.1R3-S2; 21.2 versiones anteriores a 21.2R3-S1; 21.3 versiones anteriores a 21.3R3; 21.4 versiones anteriores a 21.4R1-S2, 21.4R2; 22.1 versiones anteriores a 22.1R1-S1, 22.1R2. Este problema no afecta a Juniper Networks Junos OS versiones anteriores a 20.2R1",
      },
   ],
   id: "CVE-2022-22235",
   lastModified: "2024-11-21T06:46:27.300",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-18T03:15:10.537",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69891",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69891",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-04-22 20:15
Modified
2024-11-21 05:42
Summary
On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue affects Juniper Networks Junos OS on SRX Series: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3.
Impacted products
Vendor Product Version
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "FA99E0A9-8C98-49A8-A248-A53E3B723A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76105563-4DA1-4A0E-A627-C44BA93F1862",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8C108419-A74F-4B19-AD47-7A87B76DE18A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AC844E23-54CE-4F6F-8B69-A84DA0109B17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "BCEE8D9C-6D64-4A9B-A74A-57A0BF4086C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E889BF9C-BDDF-4A6A-97BB-00A097EF6D91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8BCF0612-AF16-4925-8E42-77734513F923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "595987A6-D8CE-41ED-B51C-EF9CD3B47AD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "7B5A2205-C40B-4746-9A23-1973433FF065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CFA3526C-FF53-4823-B6AC-0BA91BFB532D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "AA92B7F8-705B-410F-BDA3-7C28FF51967F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9990301C-9D79-4372-8EC6-71A209B0C0D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "9689695F-53EB-4B35-9072-750E7282B011",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
                     matchCriteriaId: "4F7CE683-5647-455B-936C-DF0D973A180A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7D45F2C3-20FF-4A91-A440-E109B3CCE7C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "BA433E05-83F8-410D-AEB3-3A02BAB0BE0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "95473197-2553-4252-B5E5-CAF904C2EA6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B87ECEAD-FD18-4252-8D46-F281DD4125AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "C6788EE2-B0DA-470E-B72E-E8D5CCFB5259",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "11E055AC-5626-4EBB-8611-17BB1E8AEF15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5FD8A8E1-201B-4E4E-8F69-23856E56AF60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "897850A3-2A27-483C-8266-E4547F1A4341",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "7939BCE6-D4E8-4366-B954-32D77F21A35D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "A283D32F-1CAF-4A5A-83E1-585F2801771F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "38A40E03-F915-4888-87B0-5950F75F097D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C52E355B-DA7D-4FDE-B2D7-A3C3C9C99918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "267A3603-BC18-442E-803A-4CAEB6493433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A2C7B980-033E-40AC-98C9-B252733B0F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BA8D32E4-1892-46DC-9782-5466A14E18D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "25C7C3D0-A203-4979-8375-A610ADD48E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
                     matchCriteriaId: "D1CAEBD2-2E46-44B5-B1D1-1DDBD450FD27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "565AE6D8-28A9-4A62-A886-5BAB954695D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "E32BE8B3-C5D9-43D1-B425-28D58EA74DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C366F93-BB30-4144-99AE-40B676977834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "488BB10A-1360-42E5-A68D-23D51B332850",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "64988F0A-E02C-455B-99C9-4059C896416F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "DC2ACA85-FA89-40F0-A2AD-778E1CB02A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9F431D3D-5D55-45A9-98E8-00CB1D4C0196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "C9C703CA-9309-413A-9CD7-585277ADD32D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "130E4A30-A19D-4D1E-B91C-575E8F43EA87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "E3AC83F1-2BCF-4159-9719-EB15ADD7663B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "F0F65DCA-34B9-4CE8-91C9-426AAAEB4097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "341417EE-71C2-465C-96CA-65B2B5B63FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "A701A73D-A795-47DD-8EB5-55D1CDF67A49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "4EC7D216-D8F3-4ABD-97C9-4C9FB6DF64FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5E327643-D8D8-4EFA-9F38-BA862A919501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "1BC6CE1C-9DD8-429E-BDC2-251D8C8674E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "63B00B4F-3E65-4CB2-807D-43908B570AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "8732E25A-9073-4C7B-9E89-C02368728EB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09255363-BF79-4FC3-AADD-5FAD0902174F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "11A24AA6-5378-4EEA-82D5-66A5F1110698",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "64CF2868-993A-48C8-8FBA-892507BBBF21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D2D5D460-EC5C-46BF-8017-CB87B45C69BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
                     matchCriteriaId: "90BF177D-A895-4D05-B674-B27420A5DC6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "238EC996-8E8C-4332-916F-09E54E6EBB9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EEFCDA90-67E2-4AEF-800C-1D29A9121B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "74B99981-840F-4DAD-976A-5DAEFE9FB93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BDD3ADB9-35FF-41D3-92BD-98D6D4826B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "341F2459-8335-40E9-A2B3-BE804D319F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "0CD17956-8E8C-489D-927A-5709C05EA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B670F988-78F2-4BC6-B7FC-E34C280F67DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2F9451C7-6466-4AC9-9A7F-90A2817AED6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "871CA952-C5EC-4A25-8EF0-C2EC484F7DE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "80E2AD65-3DAC-4618-AB73-C43EDCDC7A13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "B783A510-A694-4BF0-8995-F05507F75A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C9CAAF7C-9876-473A-BE83-16EA8F00E8C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "3E4F0A1E-B15E-44C3-A55D-8AC016915451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "B7A3FBD3-5399-42A9-9BD9-E3C981CBD6DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD361C-8B4D-43EF-8B82-9FE165D8206E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6E7539C4-6208-43EB-9A0B-4852D0CE0FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "35299B02-DC75-458D-B86D-8A0DB95B06AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC3EF2-3339-4E3C-9C6D-E854EBBDEF9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CFB29C9B-9729-43EB-AF98-AF44038DA711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2D1FB957-54C8-428E-BC8D-2802D7F6895F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A0BC4766-4BA4-4B02-A654-5C527EA66E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BB8263A9-5D63-46A2-9C98-B3980910B612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue affects Juniper Networks Junos OS on SRX Series: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3.",
      },
      {
         lang: "es",
         value: "En los dispositivos de la serie SRX de Juniper Networks con agregación de enlaces (lag) configurada, la ejecución de cualquier operación que recupere las estadísticas de la interfaz de Ethernet agregada (AE), incluidas, entre otras, las solicitudes GET de SNMP, provoca una fuga de memoria lenta del núcleo. Si se consume toda la memoria disponible, el tráfico se verá afectado y podría ser necesario un reinicio. El siguiente registro se puede ver si este problema ocurre. /kernel: rt_pfe_veto: Memoria sobre consumida. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd Un administrador puede utilizar el siguiente comando CLI para monitorizar el estado del consumo de memoria (ifstat bucket): user@device &gt; show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Size(s) ifstat 2588977 162708K - 19633958 &lt;&lt;&lt;&lt; user@device &gt; show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Size(s) ifstat 3021629 189749K - 22914415 &lt;&lt;&lt;&lt; Este problema afecta a Juniper Networks Junos OS en la serie SRX: 17.1 versiones 17.1R3 y superiores anteriores a 17.3R3-S11; 17.4 versiones anteriores a 17.4R3-S5; 18.2 versiones anteriores a 18.2R3-S7, 18.2R3-S8; 18.3 versiones anteriores a 18.3R3-S4; 18.4 versiones anteriores a 18.4R2-S7, 18.4R3-S6; 19.1 versiones anteriores a 19. 1R3-S4; 19.2 versiones anteriores a 19.2R1-S6; 19.3 versiones anteriores a 19.3R3-S1; 19.4 versiones anteriores a 19.4R3-S1; 20.1 versiones anteriores a 20.1R2, 20.1R3; 20.2 versiones anteriores a 20.2R2-S2, 20.2R3; 20.3 versiones anteriores a 20.3R1-S2, 20.3R2. Este problema no afecta al sistema operativo Junos de Juniper Networks anterior a la versión 17.1R3",
      },
   ],
   id: "CVE-2021-0230",
   lastModified: "2024-11-21T05:42:15.497",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-04-22T20:15:08.640",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11125",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11125",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-08-18 03:29
Modified
2024-11-21 03:50
Summary
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
Impacted products
Vendor Product Version
embedthis appweb *
embedthis goahead *
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-24mp -
juniper ex2300-24p -
juniper ex2300-24t -
juniper ex2300-48mp -
juniper ex2300-48p -
juniper ex2300-48t -
juniper ex2300-c -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300m -
juniper ex4400 -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper mx -
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper ptx1000 -
juniper ptx1000-72q -
juniper ptx10000 -
juniper ptx10001 -
juniper ptx10001-36mr -
juniper ptx100016 -
juniper ptx10002 -
juniper ptx10002-60c -
juniper ptx10003 -
juniper ptx10003_160c -
juniper ptx10003_80c -
juniper ptx10003_81cd -
juniper ptx10004 -
juniper ptx10008 -
juniper ptx10016 -
juniper ptx3000 -
juniper ptx5000 -
juniper t1600 -
juniper t320 -
juniper t4000 -
juniper t640 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper ex2300 -
juniper ex3400 -
juniper qfx10000 -
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB807B3-7212-47D3-AB21-DCCE3007B3A5",
                     versionEndExcluding: "7.0.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C10C04-AC2A-433C-B01B-AD587648FE63",
                     versionEndExcluding: "4.0.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*",
                     matchCriteriaId: "92F31F7F-02E0-4E63-A600-DF8AB4E3BAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
                     matchCriteriaId: "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
                     matchCriteriaId: "4FD4237A-C257-4D8A-ABC4-9B2160530A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5A449C87-C5C3-48FE-9E46-64ED5DD5F193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
                     matchCriteriaId: "F4B6215F-76BF-473F-B325-0975B0EB101E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
                     matchCriteriaId: "A1C4A10C-49A3-4103-9E56-F881113BC5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
                     matchCriteriaId: "50E7FD07-A309-48EC-A520-C7F0FA35865C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F868948A-04D7-473B-971F-721302653633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
                     matchCriteriaId: "830A9EBA-88F1-4277-B98F-75AC52A60824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
                     matchCriteriaId: "BFA2ADAB-E486-4DBB-8B84-CC095D102278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
                     matchCriteriaId: "9ACD0C03-ACD9-4D47-B3EE-1D8753FF5A83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
                     matchCriteriaId: "0DD32D8A-7531-4691-B45D-9EACC69A23D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*",
                     matchCriteriaId: "76DFA52F-5B2E-47DA-9A8E-7D17A7413929",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d66:*:*:*:*:*:*",
                     matchCriteriaId: "4D363E73-ABC4-4E9F-9E7B-86087D3A3F9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d67:*:*:*:*:*:*",
                     matchCriteriaId: "A7502F95-BADC-432A-B7BE-8E9931FA1448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d70:*:*:*:*:*:*",
                     matchCriteriaId: "9451CD3F-BF4E-4BBC-AD00-660BE2B313C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d71:*:*:*:*:*:*",
                     matchCriteriaId: "C63E8B17-250D-4D74-9A1F-2F3577D9A071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d72:*:*:*:*:*:*",
                     matchCriteriaId: "801AB7D7-3407-4F8B-83C4-CC16076DB0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d73:*:*:*:*:*:*",
                     matchCriteriaId: "FA4104D4-3FA2-4936-ACBD-06B0BD0B9E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*",
                     matchCriteriaId: "090BB276-C169-4A41-B03D-0EC40D20E8BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*",
                     matchCriteriaId: "51732A2B-52E2-4356-8409-5CB6D79F23DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*",
                     matchCriteriaId: "AC1FED64-8725-4978-9EBF-E3CD8EF338E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
                     matchCriteriaId: "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
                     matchCriteriaId: "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5FF83BD0-3B28-481E-8C8F-09ECDA493DA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6E296274-AFC1-4F56-A4B3-827C2E0BC9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
                     matchCriteriaId: "3C82799B-BD25-4359-9E3D-4D7CA7367525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
                     matchCriteriaId: "094485FF-960C-4533-A2AF-6C4D420D260D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F8BE3661-1DE5-4F57-9384-68C1B34F6812",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
                     matchCriteriaId: "B45E8A14-E7F4-41EB-9BFA-7A19E35D11FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
                     matchCriteriaId: "C6C694C6-C58C-4513-91E8-6CC22A2386E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d51:*:*:*:*:*:*",
                     matchCriteriaId: "64A0CCD4-91BA-440E-A14C-48E67D1F03A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
                     matchCriteriaId: "6B65EF51-ED97-4973-94C4-8F66C553F190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
                     matchCriteriaId: "9EE7C08A-2A4B-4A84-AD95-A890913E2EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*",
                     matchCriteriaId: "44C61900-680C-4C74-8B96-ACC93FE9465E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*",
                     matchCriteriaId: "6A793CCD-397E-45DA-9349-D01C69AB96D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*",
                     matchCriteriaId: "B6C38637-ABE0-419A-A053-CBE076766551",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*",
                     matchCriteriaId: "1F87EF0D-E609-4D4A-B228-CEF05C753E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*",
                     matchCriteriaId: "27A6BF09-ABBF-4126-ADD6-B174937F8554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
                     matchCriteriaId: "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
                     matchCriteriaId: "856A5668-FA4F-44E9-A3F0-BE4979F631E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
                     matchCriteriaId: "F3B2DA4D-5E5D-4E09-BE4D-5B3371703D8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
                     matchCriteriaId: "FA2459ED-DFA5-4701-AF92-C2928C3BD64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
                     matchCriteriaId: "8830C4BC-2B3D-4CCF-A37E-79C2D46159BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
                     matchCriteriaId: "40D42ACF-860C-4B47-8E25-7DEC30FB8064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
                     matchCriteriaId: "C808E08F-1992-43DD-A106-E920DC784831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*",
                     matchCriteriaId: "C8C94365-988C-4A14-8E49-846152FDC666",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
                     matchCriteriaId: "E288F54B-AEA3-412F-85A4-EBDFE74DB84F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*",
                     matchCriteriaId: "02AAC05C-1C4B-4F35-A286-52D20DFD6212",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
                     matchCriteriaId: "080422D3-B508-4049-B558-4B04BF2E8AB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
                     matchCriteriaId: "18468579-0195-4DDE-BAA5-4BE4068F3A69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6825F6BA-B48F-4E02-938F-6B297E21BA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
                     matchCriteriaId: "0E5FAA97-171F-4DB9-B78E-6E1A5F34336A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
                     matchCriteriaId: "870244F3-1C05-4F10-A205-5189BB860F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
                     matchCriteriaId: "235EE40B-AA15-4F39-8087-A051F4F70995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
                     matchCriteriaId: "17330544-3AFC-463E-A146-2840A8AE17D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA301F-7866-42A5-8391-E07BEAFF06FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
                     matchCriteriaId: "884E4A85-ED42-4391-9FDD-9052F957743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
                     matchCriteriaId: "1901864B-688B-4352-A587-4B96B4E49FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
                     matchCriteriaId: "78F53FBF-C6D8-4AE5-87EC-9D9F88DCEFB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
                     matchCriteriaId: "1B6670FB-9F5A-469B-97F2-074C28572065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
                     matchCriteriaId: "71198992-83AA-4E28-BA7D-A3C1897B5E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
                     matchCriteriaId: "4323D874-C317-4D76-8E2D-C82376D84CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
                     matchCriteriaId: "F56067DA-EBA9-481A-B60B-52148584EFBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "223C12D0-61A0-4C12-8AFC-A0CB64759A31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "371A7DF8-3F4B-439D-8990-D1BC6F0C25C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
                     matchCriteriaId: "661B4C1E-DB85-4EB0-B26F-F6496CEF0AA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F7C33DE7-4947-41D1-8DDF-DC7C9541414E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12D5D63-479D-4B27-8179-3B8985DB51F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
                     matchCriteriaId: "F0DD051A-E486-4A9D-A978-A5A980AAF237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
                     matchCriteriaId: "D4ED9ACC-B6BA-4128-8934-759BB9EC904F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FC4D8EE5-E93F-4F50-9D31-CD5A69531962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
                     matchCriteriaId: "B63EF1C6-C859-4EFA-81BE-1E5AD3364B25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
                     matchCriteriaId: "B786F950-0E07-4ADC-B988-917994FE99CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2F703D05-C7A4-4EBF-A2FB-8AFE8E13DCDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
                     matchCriteriaId: "99C8DC55-60AF-44D0-86C1-1F90C5DB0235",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D23CEC9A-BF5F-489C-8CA7-1946238E20D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0010CCA3-6A76-4C18-82C4-BF44FECA4B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
                     matchCriteriaId: "4D353E7F-F773-4502-B4EE-E73BA2DE1BF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r13:*:*:*:*:*:*",
                     matchCriteriaId: "E69DD769-0C8F-4DCE-9F65-411A8CB85322",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C6F309FD-0A5A-4C86-B227-B2B511A5CEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*",
                     matchCriteriaId: "960059B5-0701-4B75-AB51-0A430247D9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*",
                     matchCriteriaId: "1D1DCA52-DA81-495B-B516-5571F01E3B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*",
                     matchCriteriaId: "05E187F6-BACD-4DD5-B393-B2FE4349053A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*",
                     matchCriteriaId: "3C240840-A6BC-4E3D-A60D-22F08E67E2B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*",
                     matchCriteriaId: "CC90563F-6BCB-4D77-8FD4-584E3A6C7741",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*",
                     matchCriteriaId: "5AD03BA7-D9EC-420F-97C4-383F79D6873F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3A0D9C0-34D3-430F-ABFA-B68010A8825D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E04B126-F290-4242-BB80-5F573D623E6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "671D9977-7657-48C7-A07C-4AED54380A86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E100C3C-070D-4132-927F-756538B91491",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2032E7DD-96FD-48B7-922C-5FE04675796C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D907D6A-B7C4-4A10-AA58-0F908575A435",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "285CD1E5-C6D3-470A-8556-653AFF74D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
                     matchCriteriaId: "83AB8877-3DC0-4B8C-B864-1BF18C368337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
                     matchCriteriaId: "D80CABB3-9A32-4FBC-AB8E-435BA85CFA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
                     matchCriteriaId: "C56F5C48-BA48-4EE1-88BE-782B3CFB3B90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
                     matchCriteriaId: "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AC196685-3B0C-4754-AE6A-6BE456CC6B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "F0146AA9-C513-4871-A62A-52C9F40EB958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A18672EF-E33D-4ACE-BB0A-561812F502C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CEF0E75F-831E-40B8-926D-B2E92A84E31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
                     matchCriteriaId: "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
                     matchCriteriaId: "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
                     matchCriteriaId: "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
                     matchCriteriaId: "BFF0C559-EC2F-4FEE-B012-E9127A68FD4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
                     matchCriteriaId: "71D211B9-B2FE-4324-AAEE-8825D5238E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "ABD3A11C-4CAA-4DDB-AD20-6C7EFA368CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
                     matchCriteriaId: "4D9134BF-7289-4503-A9C5-977C4CDCD108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2698D906-6D9D-429C-9ECC-46FF2334C637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6126279A-8509-4CA1-BFB3-E76F701F5031",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "CA0D028E-0B07-4CB2-863A-527806B9917C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "846582E4-05A0-4AD9-B78B-1707A09DAA74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E43A39D8-3BD4-41CD-A8A3-2BFF8D340BCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DECD665D-2CA4-4CB2-B77D-9230B102B339",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
                     matchCriteriaId: "85B83ED7-EE50-4F06-A386-B0A4FC7263DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
                     matchCriteriaId: "64F1FD18-AAD2-48DD-8F23-55D65D34FCE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
                     matchCriteriaId: "B02FED8D-A554-4039-9F0A-C7EEFC640317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72952BFC-45B9-4379-8D9A-A10132CC34EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E6DF99D-E438-4943-BC32-F2821E72AE0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B219F54A-4474-48CB-80F1-D988A719C3DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "249F6266-4ED6-4464-9347-9322E1481D0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CDCCB33-D428-4D64-977E-71C62F89AE5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C188428C-0558-44FB-845C-E885DE9A0733",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx100016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F94757-34CE-4F88-A6D3-544FE6A476D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B22AC2-B794-4F12-9EB3-9AA6E4B19831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5462DF-5CF1-4DF9-989B-622EA734964F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BD05415-9F94-4EB8-805A-C9C0FFA9D0DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1E88A41-B158-4A66-9DFD-438931C6BE68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C97FFB5-8755-474B-ABCF-98DC7659208E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAECB1BF-0F3A-4AD9-AF6B-E54A13D9D804",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C432E543-37F5-4CA0-B239-2B97C6A16907",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A64A26-4606-4D33-8958-5A3B7FFC4CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1879799F-18B2-4958-AA90-FD19348C889F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "516476F9-7D4C-494F-99AA-750F4467CD15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "654140A0-FEC0-4DB4-83BF-ECCB000DFA4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B6E6B57-BFF3-4AD2-979A-B2C4FD9F138E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B52F913-266E-44CB-BFA3-85AC9D55FF1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0B57FF1-D4F8-4E28-95A7-2D29DF65D825",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t640:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12CCEFE5-F37B-482D-8670-DA40EFBB7E42",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71FB14A-67D4-4EDD-BB32-07764F5AFA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:-:*:*:*:*:*:*",
                     matchCriteriaId: "C9511DD0-D910-4C29-B0E3-8F9D0531F09C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*",
                     matchCriteriaId: "6E87C765-8D68-404A-AC71-3F22A7260E8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
                     matchCriteriaId: "1E3B807C-196D-42B8-9042-7582A1366772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
                     matchCriteriaId: "83FEEE8F-9279-46F2-BAF9-A60537020C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
                     matchCriteriaId: "BBD36C0D-0F44-4349-968D-4CD60F281D84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*",
                     matchCriteriaId: "3E364FE2-5FB1-4E14-8DF5-CA21F4BFBBC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*",
                     matchCriteriaId: "7F22C4C2-20E0-428F-A9BF-37E8BD63A9E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*",
                     matchCriteriaId: "71334963-7BF1-49DB-84E6-D6F2A927458B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:*",
                     matchCriteriaId: "E773AA7F-AB97-488A-B73D-682FB5553B31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d234:*:*:*:*:*:*",
                     matchCriteriaId: "E9196882-FE7B-489A-81AC-55355864DA93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d235:*:*:*:*:*:*",
                     matchCriteriaId: "93CCFF32-D589-4E84-9A08-D667B14B0B73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d236:*:*:*:*:*:*",
                     matchCriteriaId: "F218BBE0-8F18-4A8E-8C95-8249B6776958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d237:*:*:*:*:*:*",
                     matchCriteriaId: "E56F9D8C-27AA-43EC-9043-7A480265CE75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
                     matchCriteriaId: "1DD0B95A-7C9F-4A18-9CD8-BA344DEFC9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
                     matchCriteriaId: "1F294E43-73FA-4EF3-90F2-EE29C56D6573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d31:*:*:*:*:*:*",
                     matchCriteriaId: "6F3ED4F6-483F-41DC-BBCF-3605641ACAD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
                     matchCriteriaId: "EDDE1048-BFEA-4A3E-8270-27C538A68837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
                     matchCriteriaId: "CC517CD0-FF35-498F-AD33-683B43CA3829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
                     matchCriteriaId: "53F7E1C5-BFA9-426C-9F95-3EA5DB458C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
                     matchCriteriaId: "C2B5ED13-F998-447C-8FEA-047FE9FE2F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
                     matchCriteriaId: "65F3CD2A-D5E1-4EFF-9013-6D81B396F765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d47:*:*:*:*:*:*",
                     matchCriteriaId: "4C2A9C1A-AEE4-4CD6-91D7-D0E9F2717512",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d470:*:*:*:*:*:*",
                     matchCriteriaId: "AE20A296-0B0D-47B6-8F63-3B664D0F549C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:*",
                     matchCriteriaId: "ABA63850-E536-4E2E-BFDD-7BDBB965BDB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d48:*:*:*:*:*:*",
                     matchCriteriaId: "1749B778-0E36-4539-8668-89F4460F251F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:*",
                     matchCriteriaId: "5582D0E6-292E-487B-9DAC-143D5D1C0D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*",
                     matchCriteriaId: "723FD85C-C763-4017-B6BF-0CA707997D2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:*",
                     matchCriteriaId: "D58997E6-96B4-4930-A29D-B49D06DFA9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:*",
                     matchCriteriaId: "AFB887FD-D3FB-439F-9A89-CC367A74DB00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:*",
                     matchCriteriaId: "BDA46912-D173-49C5-A0A1-64BD0889D3A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:*",
                     matchCriteriaId: "3BEE4EE4-18D9-4FA9-9A02-917240B851AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d56:*:*:*:*:*:*",
                     matchCriteriaId: "3978B35D-5745-47BC-A56F-A0678AB0F3E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*",
                     matchCriteriaId: "188FED65-8A81-4BB0-B10B-8CA17B4F71CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:*",
                     matchCriteriaId: "9F03E847-748B-43BD-B6C1-BFDECE99BC3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:*",
                     matchCriteriaId: "92E31AF0-83EB-4570-A6DE-4308BE0D3A43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d590:*:*:*:*:*:*",
                     matchCriteriaId: "F06DA47B-1BAB-477F-BB99-09D6A9DC0CE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
                     matchCriteriaId: "962CCED8-E321-4878-9BE6-0DC33778559A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
                     matchCriteriaId: "2B08B97A-5D4D-405B-A1C4-9E327E4EED35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
                     matchCriteriaId: "738C1061-E8B8-4924-AFE9-5E59F22CA4A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
                     matchCriteriaId: "9071DC8C-D0AA-448E-82BF-7C801199193F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*",
                     matchCriteriaId: "395CC50B-9042-4B12-9A1C-A8D5D571DC25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
                     matchCriteriaId: "F0396190-54A5-4F11-8530-B5EC7BCBC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*",
                     matchCriteriaId: "E56CF063-0CB3-4BD6-978B-B9D7C0C8C4AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:*",
                     matchCriteriaId: "60D515B2-9747-465B-8854-887C6FDA8743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d68:*:*:*:*:*:*",
                     matchCriteriaId: "6EEBB60C-E607-4262-9C8B-7B7E2D011B28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:*",
                     matchCriteriaId: "88BAA95F-7CA2-46A0-8F60-588941AF3E44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF2039C-E08C-472F-82E6-DAD3F94724B5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "285CD1E5-C6D3-470A-8556-653AFF74D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
                     matchCriteriaId: "83AB8877-3DC0-4B8C-B864-1BF18C368337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
                     matchCriteriaId: "D80CABB3-9A32-4FBC-AB8E-435BA85CFA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
                     matchCriteriaId: "C56F5C48-BA48-4EE1-88BE-782B3CFB3B90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
                     matchCriteriaId: "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AC196685-3B0C-4754-AE6A-6BE456CC6B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "F0146AA9-C513-4871-A62A-52C9F40EB958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A18672EF-E33D-4ACE-BB0A-561812F502C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CEF0E75F-831E-40B8-926D-B2E92A84E31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
                     matchCriteriaId: "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
                     matchCriteriaId: "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
                     matchCriteriaId: "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
                     matchCriteriaId: "BFF0C559-EC2F-4FEE-B012-E9127A68FD4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
                     matchCriteriaId: "71D211B9-B2FE-4324-AAEE-8825D5238E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "ABD3A11C-4CAA-4DDB-AD20-6C7EFA368CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
                     matchCriteriaId: "4D9134BF-7289-4503-A9C5-977C4CDCD108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2698D906-6D9D-429C-9ECC-46FF2334C637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6126279A-8509-4CA1-BFB3-E76F701F5031",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "CA0D028E-0B07-4CB2-863A-527806B9917C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "846582E4-05A0-4AD9-B78B-1707A09DAA74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E43A39D8-3BD4-41CD-A8A3-2BFF8D340BCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DECD665D-2CA4-4CB2-B77D-9230B102B339",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
                     matchCriteriaId: "85B83ED7-EE50-4F06-A386-B0A4FC7263DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
                     matchCriteriaId: "64F1FD18-AAD2-48DD-8F23-55D65D34FCE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
                     matchCriteriaId: "B02FED8D-A554-4039-9F0A-C7EEFC640317",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
                     matchCriteriaId: "BD332D86-5DA7-49A4-98C3-E4D946832DC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
                     matchCriteriaId: "6BFFAC38-5D41-4BDB-B9D4-579F104A61BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C7620D01-1A6B-490F-857E-0D803E0AEE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
                     matchCriteriaId: "03B09A78-9DEA-43A7-8DD6-56D94869DAEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "18B1A6D6-EB40-461A-87B0-FD777019E1BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "F8CD62D3-0894-426E-80A8-CEBCBD49810F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
                     matchCriteriaId: "08FC0245-A4FF-42C0-A236-8569301E351A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
                     matchCriteriaId: "A68E7711-C7B9-4578-AB7B-863F088A38BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E0501706-CB27-42B6-916B-B0009EC333C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
                     matchCriteriaId: "41E43503-A694-406E-B95A-689E4167A4FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A464B371-1B8B-4563-8728-969825896115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "120EA9E3-788B-4CFD-A74F-17111FFD0131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "6B4C2FBB-FEA0-4B98-8568-705FFFFFBB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "B2506FCC-4B0F-4FEF-A44E-0C704B6217F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "9D9F2F31-B378-40FE-B012-000A225B76F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D014FF7B-BBEA-4F80-BE0E-4C70E4585A1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "C8257676-7AA7-4B39-A8F8-685843D0685B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "31001EA8-2C65-4D3D-AEC7-F298692E8752",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
                     matchCriteriaId: "33A3ECF9-AA4D-41F9-8441-1EB5F1DB882E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s10:*:*:*:*:*:*",
                     matchCriteriaId: "17C66198-8D9A-454C-B645-A040A5C1E12E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s11:*:*:*:*:*:*",
                     matchCriteriaId: "E0309A32-5087-4918-B1EE-10EC28F50B2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s12:*:*:*:*:*:*",
                     matchCriteriaId: "28CB995B-97C5-4FC4-B054-94835CE2B363",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
                     matchCriteriaId: "989D1170-C430-4117-8E3B-46D8B459DF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DB2FD851-BBB6-4D29-B933-1070564E0B50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "258A380C-1EA0-407D-B7E3-4A2E8820119C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "BBE35BDC-7739-4854-8BB8-E8600603DE9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2DC47132-9EEA-4518-8F86-5CD231FBFB61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CD5A30CE-9498-4007-8E66-FD0CC6CF1836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "07CD1E7C-24EA-46B7-964C-C78FF64AFAE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
                     matchCriteriaId: "8A457C57-4A36-433D-9473-5ABC091DF316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "F2E0A48F-C85B-4973-A054-28A888EA5ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "6D3E38C1-808C-4BD3-993D-F30855F5390F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
                     matchCriteriaId: "C2AF9C4B-23E6-485D-A115-2B728E929C6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1FD11073-DC27-41F8-A6A2-7E22A062D14E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
                     matchCriteriaId: "2A78389E-868C-422D-9AA3-8A672DF6C2AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
                     matchCriteriaId: "85BFC22F-A6B3-4306-A28B-5D78FFA6402D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
                     matchCriteriaId: "99276E50-825C-4BB4-8496-1F81BDA21655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "22B700C1-C690-4C7D-A5AE-45BBB550D52F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "50DDDE48-3F73-440F-82ED-BD9D62A407B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
                     matchCriteriaId: "72194CB7-FFDC-4897-9D6E-EA3459DDDEB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
                     matchCriteriaId: "C88635DB-09B1-4DA1-8FC3-2F7A7E42819C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "92F35C19-5AD2-4F98-8313-2E880714DF3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "DF5A9D31-ED7D-4390-B46D-7E46089DB932",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3BE0AD25-767F-4719-9BE4-C8BDF78A6C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "19684897-77CE-4E50-B9D2-25E6114E66A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "90B94472-0E32-48AD-A690-AABB2C53CA58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "6B4A4960-0241-4BF4-8857-8B7BE33466B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C2DC367C-7F0B-4775-9BE9-464B28543D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
                     matchCriteriaId: "863744A8-8759-4646-9E39-72D511DE4A10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
                     matchCriteriaId: "732A499C-9FAC-4307-B090-8971970B3EF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
                     matchCriteriaId: "9D3848D1-936D-44BB-B951-E4296F113641",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "9677CE18-B955-432F-BA2B-AAE3D0CA0F16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3661BC68-6F32-447F-8D20-FD73FBBED9C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "8008342F-4BF3-49D8-B516-C08AAF9E469E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5B6097D4-3856-4696-9A26-5B6C0FD9AD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84DD80BF-BF7E-447B-AA74-00B3D8036E36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "D8A72B62-E3B7-42FA-980F-75BDF15236FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "57B89EEB-222D-46AA-BC8F-4EE7E17BA7B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "ECAE613D-1317-4D2E-8A61-980CD5DEAED8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "BAB2D63C-C966-42CA-85A9-09820D00A2D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5A7231C6-1CC4-4E7A-A317-5315246D2540",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "B14E079B-4E8F-4DAC-85C7-ECC888EBD306",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "CC9B5CDE-3A50-4CD3-962A-FA0989939F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "7572C187-4D58-4E0D-A605-B2B13EFF5C6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "3DE6E051-2F2F-4862-9001-5DA83C4BCF75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E34A149E-C2ED-4D86-A105-0A2775654AE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4E0D42C4-9B4D-44F9-BC84-E7994404598B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "CC7A70CD-3A5E-4F01-8469-E5CD406BB04F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "1733E9C1-05FF-4D84-8AE3-315A61288D9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "DE2C20D8-3C73-4B87-BA41-DBFBCA5FBA58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54D887B4-D2F4-4537-8298-B98D01396F12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1C1B5AE6-A323-4744-BCA1-25E46D2D27BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "0AB39E2F-0D67-4FA6-84B8-36684E971002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A32C3702-48DE-47CF-B0D1-3A629676AD03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "B9695B3E-FCDA-4DF0-B714-8B4F87AA647D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "36214C23-82C8-4A3E-9FF8-04F85FF8B2B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "F3778643-1684-4549-A764-A1909C14B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7D45F2C3-20FF-4A91-A440-E109B3CCE7C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "95473197-2553-4252-B5E5-CAF904C2EA6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B87ECEAD-FD18-4252-8D46-F281DD4125AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "11E055AC-5626-4EBB-8611-17BB1E8AEF15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "A283D32F-1CAF-4A5A-83E1-585F2801771F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "38A40E03-F915-4888-87B0-5950F75F097D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C52E355B-DA7D-4FDE-B2D7-A3C3C9C99918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "267A3603-BC18-442E-803A-4CAEB6493433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A2C7B980-033E-40AC-98C9-B252733B0F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
                     matchCriteriaId: "D1CAEBD2-2E46-44B5-B1D1-1DDBD450FD27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "565AE6D8-28A9-4A62-A886-5BAB954695D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C366F93-BB30-4144-99AE-40B676977834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "488BB10A-1360-42E5-A68D-23D51B332850",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "64988F0A-E02C-455B-99C9-4059C896416F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "0DFDD907-5305-4602-8A9C-685AA112C342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B0A756E2-C320-405A-B24F-7C5022649E5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6F4C1-6A7E-474F-89BC-7A3C50FD8CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84F5BCBA-404B-4BC9-B363-CE6D231B0D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18A4CA3E-DA61-49CC-8476-3A476CCB2B83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A7380B3E-09F5-4497-86C6-11EF56BD89F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "658841A9-BEC9-433E-81D0-47DE82887C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5AD05209-1274-4F8A-9FA2-A1A8DFCC5755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C97683B3-A07B-428F-9535-C49B55305679",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A14CE132-C56B-43D8-A248-AB6A2D1A7B6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
                     matchCriteriaId: "90BF177D-A895-4D05-B674-B27420A5DC6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.",
      },
      {
         lang: "es",
         value: "Se ha descubierto un problema en Embedthis GoAhead en versiones anteriores a la 4.0.1 y Appweb anteriores a la 7.0.2. El servidor maneja incorrectamente algunos campos request HTTP asociados con time, lo que resulta en una desreferencia de puntero NULL, tal y como queda demostrado con If-Modified-Since o If-Unmodified-Since con mes mayor a 11.",
      },
   ],
   id: "CVE-2018-15504",
   lastModified: "2024-11-21T03:50:57.413",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-08-18T03:29:00.237",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/embedthis/appweb/issues/605",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/embedthis/goahead/issues/264",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2019-07-Security-Bulletin-Junos-OS-J-Web-Denial-of-Service-due-to-multiple-vulnerabilities-in-Embedthis-Appweb-Server",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/embedthis/appweb/issues/605",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/embedthis/goahead/issues/264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2019-07-Security-Bulletin-Junos-OS-J-Web-Denial-of-Service-due-to-multiple-vulnerabilities-in-Embedthis-Appweb-Server",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-03-31 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".
References
cve@mitre.orghttp://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2015/Apr/19Mailing List, Third Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2015/Apr/19Mailing List, Third Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2015/Mar/158Exploit, Mailing List, Third Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2015/Mar/158Exploit, Mailing List, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2015/03/28/2Mailing List, Patch
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2015/04/06/2Mailing List, Patch
cve@mitre.orghttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlPatch, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/535028/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/73407Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037007Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttps://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348Broken Link, Patch
cve@mitre.orghttps://github.com/embedthis/appweb/issues/413Broken Link, Exploit, Issue Tracking
cve@mitre.orghttps://security.paloaltonetworks.com/CVE-2014-9708Third Party Advisory
cve@mitre.orghttps://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_USThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Apr/19Mailing List, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Apr/19Mailing List, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Mar/158Exploit, Mailing List, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Mar/158Exploit, Mailing List, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/03/28/2Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/04/06/2Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/535028/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/73407Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037007Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348Broken Link, Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/embedthis/appweb/issues/413Broken Link, Exploit, Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://security.paloaltonetworks.com/CVE-2014-9708Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_USThird Party Advisory
Impacted products
Vendor Product Version
oracle enterprise_communications_broker *
embedthis appweb *
embedthis appweb *
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-24mp -
juniper ex2300-24p -
juniper ex2300-24t -
juniper ex2300-48mp -
juniper ex2300-48p -
juniper ex2300-48t -
juniper ex2300-c -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300m -
juniper ex4400 -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper mx -
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper ptx1000 -
juniper ptx1000-72q -
juniper ptx10000 -
juniper ptx10001 -
juniper ptx10001-36mr -
juniper ptx100016 -
juniper ptx10002 -
juniper ptx10002-60c -
juniper ptx10003 -
juniper ptx10003_160c -
juniper ptx10003_80c -
juniper ptx10003_81cd -
juniper ptx10004 -
juniper ptx10008 -
juniper ptx10016 -
juniper ptx3000 -
juniper ptx5000 -
juniper t1600 -
juniper t320 -
juniper t4000 -
juniper t640 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper ex2300 -
juniper ex3400 -
juniper qfx10000 -
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 16.2
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.1
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C092F5B-BF4D-4205-BAB7-AC8C9FA15414",
                     versionEndIncluding: "2.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5F3EEF2-BB5E-4599-B7B4-FDA512C26182",
                     versionEndExcluding: "4.6.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F6DD35A-329F-4E4F-98FF-9DE5A93321E4",
                     versionEndExcluding: "5.2.1",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*",
                     matchCriteriaId: "92F31F7F-02E0-4E63-A600-DF8AB4E3BAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
                     matchCriteriaId: "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
                     matchCriteriaId: "4FD4237A-C257-4D8A-ABC4-9B2160530A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5A449C87-C5C3-48FE-9E46-64ED5DD5F193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
                     matchCriteriaId: "F4B6215F-76BF-473F-B325-0975B0EB101E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
                     matchCriteriaId: "A1C4A10C-49A3-4103-9E56-F881113BC5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
                     matchCriteriaId: "50E7FD07-A309-48EC-A520-C7F0FA35865C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F868948A-04D7-473B-971F-721302653633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
                     matchCriteriaId: "830A9EBA-88F1-4277-B98F-75AC52A60824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
                     matchCriteriaId: "BFA2ADAB-E486-4DBB-8B84-CC095D102278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
                     matchCriteriaId: "9ACD0C03-ACD9-4D47-B3EE-1D8753FF5A83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
                     matchCriteriaId: "0DD32D8A-7531-4691-B45D-9EACC69A23D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*",
                     matchCriteriaId: "76DFA52F-5B2E-47DA-9A8E-7D17A7413929",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d66:*:*:*:*:*:*",
                     matchCriteriaId: "4D363E73-ABC4-4E9F-9E7B-86087D3A3F9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d67:*:*:*:*:*:*",
                     matchCriteriaId: "A7502F95-BADC-432A-B7BE-8E9931FA1448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d70:*:*:*:*:*:*",
                     matchCriteriaId: "9451CD3F-BF4E-4BBC-AD00-660BE2B313C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d71:*:*:*:*:*:*",
                     matchCriteriaId: "C63E8B17-250D-4D74-9A1F-2F3577D9A071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d72:*:*:*:*:*:*",
                     matchCriteriaId: "801AB7D7-3407-4F8B-83C4-CC16076DB0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d73:*:*:*:*:*:*",
                     matchCriteriaId: "FA4104D4-3FA2-4936-ACBD-06B0BD0B9E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*",
                     matchCriteriaId: "090BB276-C169-4A41-B03D-0EC40D20E8BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*",
                     matchCriteriaId: "51732A2B-52E2-4356-8409-5CB6D79F23DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*",
                     matchCriteriaId: "AC1FED64-8725-4978-9EBF-E3CD8EF338E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
                     matchCriteriaId: "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
                     matchCriteriaId: "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5FF83BD0-3B28-481E-8C8F-09ECDA493DA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6E296274-AFC1-4F56-A4B3-827C2E0BC9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
                     matchCriteriaId: "3C82799B-BD25-4359-9E3D-4D7CA7367525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
                     matchCriteriaId: "094485FF-960C-4533-A2AF-6C4D420D260D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F8BE3661-1DE5-4F57-9384-68C1B34F6812",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
                     matchCriteriaId: "B45E8A14-E7F4-41EB-9BFA-7A19E35D11FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
                     matchCriteriaId: "C6C694C6-C58C-4513-91E8-6CC22A2386E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d51:*:*:*:*:*:*",
                     matchCriteriaId: "64A0CCD4-91BA-440E-A14C-48E67D1F03A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
                     matchCriteriaId: "6B65EF51-ED97-4973-94C4-8F66C553F190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
                     matchCriteriaId: "9EE7C08A-2A4B-4A84-AD95-A890913E2EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*",
                     matchCriteriaId: "44C61900-680C-4C74-8B96-ACC93FE9465E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*",
                     matchCriteriaId: "6A793CCD-397E-45DA-9349-D01C69AB96D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*",
                     matchCriteriaId: "B6C38637-ABE0-419A-A053-CBE076766551",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*",
                     matchCriteriaId: "1F87EF0D-E609-4D4A-B228-CEF05C753E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*",
                     matchCriteriaId: "27A6BF09-ABBF-4126-ADD6-B174937F8554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
                     matchCriteriaId: "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
                     matchCriteriaId: "856A5668-FA4F-44E9-A3F0-BE4979F631E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
                     matchCriteriaId: "F3B2DA4D-5E5D-4E09-BE4D-5B3371703D8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
                     matchCriteriaId: "FA2459ED-DFA5-4701-AF92-C2928C3BD64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
                     matchCriteriaId: "8830C4BC-2B3D-4CCF-A37E-79C2D46159BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
                     matchCriteriaId: "40D42ACF-860C-4B47-8E25-7DEC30FB8064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
                     matchCriteriaId: "C808E08F-1992-43DD-A106-E920DC784831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*",
                     matchCriteriaId: "C8C94365-988C-4A14-8E49-846152FDC666",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
                     matchCriteriaId: "E288F54B-AEA3-412F-85A4-EBDFE74DB84F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*",
                     matchCriteriaId: "02AAC05C-1C4B-4F35-A286-52D20DFD6212",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
                     matchCriteriaId: "080422D3-B508-4049-B558-4B04BF2E8AB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
                     matchCriteriaId: "18468579-0195-4DDE-BAA5-4BE4068F3A69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6825F6BA-B48F-4E02-938F-6B297E21BA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
                     matchCriteriaId: "0E5FAA97-171F-4DB9-B78E-6E1A5F34336A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
                     matchCriteriaId: "870244F3-1C05-4F10-A205-5189BB860F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
                     matchCriteriaId: "235EE40B-AA15-4F39-8087-A051F4F70995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
                     matchCriteriaId: "17330544-3AFC-463E-A146-2840A8AE17D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA301F-7866-42A5-8391-E07BEAFF06FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
                     matchCriteriaId: "884E4A85-ED42-4391-9FDD-9052F957743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
                     matchCriteriaId: "1901864B-688B-4352-A587-4B96B4E49FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
                     matchCriteriaId: "78F53FBF-C6D8-4AE5-87EC-9D9F88DCEFB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
                     matchCriteriaId: "1B6670FB-9F5A-469B-97F2-074C28572065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
                     matchCriteriaId: "71198992-83AA-4E28-BA7D-A3C1897B5E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
                     matchCriteriaId: "4323D874-C317-4D76-8E2D-C82376D84CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
                     matchCriteriaId: "F56067DA-EBA9-481A-B60B-52148584EFBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "223C12D0-61A0-4C12-8AFC-A0CB64759A31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "371A7DF8-3F4B-439D-8990-D1BC6F0C25C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
                     matchCriteriaId: "661B4C1E-DB85-4EB0-B26F-F6496CEF0AA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F7C33DE7-4947-41D1-8DDF-DC7C9541414E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12D5D63-479D-4B27-8179-3B8985DB51F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
                     matchCriteriaId: "F0DD051A-E486-4A9D-A978-A5A980AAF237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
                     matchCriteriaId: "D4ED9ACC-B6BA-4128-8934-759BB9EC904F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FC4D8EE5-E93F-4F50-9D31-CD5A69531962",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
                     matchCriteriaId: "B63EF1C6-C859-4EFA-81BE-1E5AD3364B25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
                     matchCriteriaId: "B786F950-0E07-4ADC-B988-917994FE99CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2F703D05-C7A4-4EBF-A2FB-8AFE8E13DCDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
                     matchCriteriaId: "99C8DC55-60AF-44D0-86C1-1F90C5DB0235",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D23CEC9A-BF5F-489C-8CA7-1946238E20D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0010CCA3-6A76-4C18-82C4-BF44FECA4B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
                     matchCriteriaId: "4D353E7F-F773-4502-B4EE-E73BA2DE1BF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r13:*:*:*:*:*:*",
                     matchCriteriaId: "E69DD769-0C8F-4DCE-9F65-411A8CB85322",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C6F309FD-0A5A-4C86-B227-B2B511A5CEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*",
                     matchCriteriaId: "960059B5-0701-4B75-AB51-0A430247D9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*",
                     matchCriteriaId: "1D1DCA52-DA81-495B-B516-5571F01E3B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*",
                     matchCriteriaId: "05E187F6-BACD-4DD5-B393-B2FE4349053A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*",
                     matchCriteriaId: "3C240840-A6BC-4E3D-A60D-22F08E67E2B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*",
                     matchCriteriaId: "CC90563F-6BCB-4D77-8FD4-584E3A6C7741",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*",
                     matchCriteriaId: "5AD03BA7-D9EC-420F-97C4-383F79D6873F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3A0D9C0-34D3-430F-ABFA-B68010A8825D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E04B126-F290-4242-BB80-5F573D623E6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "671D9977-7657-48C7-A07C-4AED54380A86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E100C3C-070D-4132-927F-756538B91491",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2032E7DD-96FD-48B7-922C-5FE04675796C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D907D6A-B7C4-4A10-AA58-0F908575A435",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "285CD1E5-C6D3-470A-8556-653AFF74D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
                     matchCriteriaId: "83AB8877-3DC0-4B8C-B864-1BF18C368337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
                     matchCriteriaId: "D80CABB3-9A32-4FBC-AB8E-435BA85CFA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
                     matchCriteriaId: "C56F5C48-BA48-4EE1-88BE-782B3CFB3B90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
                     matchCriteriaId: "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AC196685-3B0C-4754-AE6A-6BE456CC6B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "F0146AA9-C513-4871-A62A-52C9F40EB958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A18672EF-E33D-4ACE-BB0A-561812F502C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CEF0E75F-831E-40B8-926D-B2E92A84E31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
                     matchCriteriaId: "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
                     matchCriteriaId: "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
                     matchCriteriaId: "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
                     matchCriteriaId: "BFF0C559-EC2F-4FEE-B012-E9127A68FD4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
                     matchCriteriaId: "71D211B9-B2FE-4324-AAEE-8825D5238E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "ABD3A11C-4CAA-4DDB-AD20-6C7EFA368CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
                     matchCriteriaId: "4D9134BF-7289-4503-A9C5-977C4CDCD108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2698D906-6D9D-429C-9ECC-46FF2334C637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6126279A-8509-4CA1-BFB3-E76F701F5031",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "CA0D028E-0B07-4CB2-863A-527806B9917C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "846582E4-05A0-4AD9-B78B-1707A09DAA74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E43A39D8-3BD4-41CD-A8A3-2BFF8D340BCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DECD665D-2CA4-4CB2-B77D-9230B102B339",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
                     matchCriteriaId: "85B83ED7-EE50-4F06-A386-B0A4FC7263DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
                     matchCriteriaId: "64F1FD18-AAD2-48DD-8F23-55D65D34FCE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
                     matchCriteriaId: "B02FED8D-A554-4039-9F0A-C7EEFC640317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72952BFC-45B9-4379-8D9A-A10132CC34EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E6DF99D-E438-4943-BC32-F2821E72AE0B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B219F54A-4474-48CB-80F1-D988A719C3DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "249F6266-4ED6-4464-9347-9322E1481D0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CDCCB33-D428-4D64-977E-71C62F89AE5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C188428C-0558-44FB-845C-E885DE9A0733",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx100016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F94757-34CE-4F88-A6D3-544FE6A476D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B22AC2-B794-4F12-9EB3-9AA6E4B19831",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5462DF-5CF1-4DF9-989B-622EA734964F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BD05415-9F94-4EB8-805A-C9C0FFA9D0DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1E88A41-B158-4A66-9DFD-438931C6BE68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C97FFB5-8755-474B-ABCF-98DC7659208E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAECB1BF-0F3A-4AD9-AF6B-E54A13D9D804",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C432E543-37F5-4CA0-B239-2B97C6A16907",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65A64A26-4606-4D33-8958-5A3B7FFC4CDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1879799F-18B2-4958-AA90-FD19348C889F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "516476F9-7D4C-494F-99AA-750F4467CD15",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "654140A0-FEC0-4DB4-83BF-ECCB000DFA4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B6E6B57-BFF3-4AD2-979A-B2C4FD9F138E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B52F913-266E-44CB-BFA3-85AC9D55FF1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0B57FF1-D4F8-4E28-95A7-2D29DF65D825",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:t640:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12CCEFE5-F37B-482D-8670-DA40EFBB7E42",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71FB14A-67D4-4EDD-BB32-07764F5AFA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:-:*:*:*:*:*:*",
                     matchCriteriaId: "C9511DD0-D910-4C29-B0E3-8F9D0531F09C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*",
                     matchCriteriaId: "6E87C765-8D68-404A-AC71-3F22A7260E8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
                     matchCriteriaId: "1E3B807C-196D-42B8-9042-7582A1366772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
                     matchCriteriaId: "83FEEE8F-9279-46F2-BAF9-A60537020C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
                     matchCriteriaId: "BBD36C0D-0F44-4349-968D-4CD60F281D84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*",
                     matchCriteriaId: "3E364FE2-5FB1-4E14-8DF5-CA21F4BFBBC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*",
                     matchCriteriaId: "7F22C4C2-20E0-428F-A9BF-37E8BD63A9E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*",
                     matchCriteriaId: "71334963-7BF1-49DB-84E6-D6F2A927458B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:*",
                     matchCriteriaId: "E773AA7F-AB97-488A-B73D-682FB5553B31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d234:*:*:*:*:*:*",
                     matchCriteriaId: "E9196882-FE7B-489A-81AC-55355864DA93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d235:*:*:*:*:*:*",
                     matchCriteriaId: "93CCFF32-D589-4E84-9A08-D667B14B0B73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d236:*:*:*:*:*:*",
                     matchCriteriaId: "F218BBE0-8F18-4A8E-8C95-8249B6776958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d237:*:*:*:*:*:*",
                     matchCriteriaId: "E56F9D8C-27AA-43EC-9043-7A480265CE75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
                     matchCriteriaId: "1DD0B95A-7C9F-4A18-9CD8-BA344DEFC9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
                     matchCriteriaId: "1F294E43-73FA-4EF3-90F2-EE29C56D6573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d31:*:*:*:*:*:*",
                     matchCriteriaId: "6F3ED4F6-483F-41DC-BBCF-3605641ACAD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
                     matchCriteriaId: "EDDE1048-BFEA-4A3E-8270-27C538A68837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
                     matchCriteriaId: "CC517CD0-FF35-498F-AD33-683B43CA3829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
                     matchCriteriaId: "53F7E1C5-BFA9-426C-9F95-3EA5DB458C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
                     matchCriteriaId: "C2B5ED13-F998-447C-8FEA-047FE9FE2F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
                     matchCriteriaId: "65F3CD2A-D5E1-4EFF-9013-6D81B396F765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d47:*:*:*:*:*:*",
                     matchCriteriaId: "4C2A9C1A-AEE4-4CD6-91D7-D0E9F2717512",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d470:*:*:*:*:*:*",
                     matchCriteriaId: "AE20A296-0B0D-47B6-8F63-3B664D0F549C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:*",
                     matchCriteriaId: "ABA63850-E536-4E2E-BFDD-7BDBB965BDB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d48:*:*:*:*:*:*",
                     matchCriteriaId: "1749B778-0E36-4539-8668-89F4460F251F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:*",
                     matchCriteriaId: "5582D0E6-292E-487B-9DAC-143D5D1C0D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*",
                     matchCriteriaId: "723FD85C-C763-4017-B6BF-0CA707997D2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:*",
                     matchCriteriaId: "D58997E6-96B4-4930-A29D-B49D06DFA9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:*",
                     matchCriteriaId: "AFB887FD-D3FB-439F-9A89-CC367A74DB00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:*",
                     matchCriteriaId: "BDA46912-D173-49C5-A0A1-64BD0889D3A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:*",
                     matchCriteriaId: "3BEE4EE4-18D9-4FA9-9A02-917240B851AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d56:*:*:*:*:*:*",
                     matchCriteriaId: "3978B35D-5745-47BC-A56F-A0678AB0F3E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*",
                     matchCriteriaId: "188FED65-8A81-4BB0-B10B-8CA17B4F71CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:*",
                     matchCriteriaId: "9F03E847-748B-43BD-B6C1-BFDECE99BC3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:*",
                     matchCriteriaId: "92E31AF0-83EB-4570-A6DE-4308BE0D3A43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d590:*:*:*:*:*:*",
                     matchCriteriaId: "F06DA47B-1BAB-477F-BB99-09D6A9DC0CE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
                     matchCriteriaId: "962CCED8-E321-4878-9BE6-0DC33778559A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
                     matchCriteriaId: "2B08B97A-5D4D-405B-A1C4-9E327E4EED35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
                     matchCriteriaId: "738C1061-E8B8-4924-AFE9-5E59F22CA4A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
                     matchCriteriaId: "9071DC8C-D0AA-448E-82BF-7C801199193F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*",
                     matchCriteriaId: "395CC50B-9042-4B12-9A1C-A8D5D571DC25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
                     matchCriteriaId: "F0396190-54A5-4F11-8530-B5EC7BCBC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*",
                     matchCriteriaId: "E56CF063-0CB3-4BD6-978B-B9D7C0C8C4AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:*",
                     matchCriteriaId: "60D515B2-9747-465B-8854-887C6FDA8743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d68:*:*:*:*:*:*",
                     matchCriteriaId: "6EEBB60C-E607-4262-9C8B-7B7E2D011B28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:*",
                     matchCriteriaId: "88BAA95F-7CA2-46A0-8F60-588941AF3E44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF2039C-E08C-472F-82E6-DAD3F94724B5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "285CD1E5-C6D3-470A-8556-653AFF74D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
                     matchCriteriaId: "83AB8877-3DC0-4B8C-B864-1BF18C368337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
                     matchCriteriaId: "D80CABB3-9A32-4FBC-AB8E-435BA85CFA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
                     matchCriteriaId: "C56F5C48-BA48-4EE1-88BE-782B3CFB3B90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
                     matchCriteriaId: "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AC196685-3B0C-4754-AE6A-6BE456CC6B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "F0146AA9-C513-4871-A62A-52C9F40EB958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A18672EF-E33D-4ACE-BB0A-561812F502C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CEF0E75F-831E-40B8-926D-B2E92A84E31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
                     matchCriteriaId: "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
                     matchCriteriaId: "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
                     matchCriteriaId: "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
                     matchCriteriaId: "BFF0C559-EC2F-4FEE-B012-E9127A68FD4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
                     matchCriteriaId: "71D211B9-B2FE-4324-AAEE-8825D5238E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "ABD3A11C-4CAA-4DDB-AD20-6C7EFA368CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
                     matchCriteriaId: "4D9134BF-7289-4503-A9C5-977C4CDCD108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2698D906-6D9D-429C-9ECC-46FF2334C637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6126279A-8509-4CA1-BFB3-E76F701F5031",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "CA0D028E-0B07-4CB2-863A-527806B9917C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "846582E4-05A0-4AD9-B78B-1707A09DAA74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E43A39D8-3BD4-41CD-A8A3-2BFF8D340BCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DECD665D-2CA4-4CB2-B77D-9230B102B339",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
                     matchCriteriaId: "85B83ED7-EE50-4F06-A386-B0A4FC7263DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
                     matchCriteriaId: "64F1FD18-AAD2-48DD-8F23-55D65D34FCE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
                     matchCriteriaId: "B02FED8D-A554-4039-9F0A-C7EEFC640317",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
                     matchCriteriaId: "BD332D86-5DA7-49A4-98C3-E4D946832DC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
                     matchCriteriaId: "6BFFAC38-5D41-4BDB-B9D4-579F104A61BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C7620D01-1A6B-490F-857E-0D803E0AEE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
                     matchCriteriaId: "03B09A78-9DEA-43A7-8DD6-56D94869DAEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "18B1A6D6-EB40-461A-87B0-FD777019E1BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "F8CD62D3-0894-426E-80A8-CEBCBD49810F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
                     matchCriteriaId: "08FC0245-A4FF-42C0-A236-8569301E351A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
                     matchCriteriaId: "A68E7711-C7B9-4578-AB7B-863F088A38BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E0501706-CB27-42B6-916B-B0009EC333C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
                     matchCriteriaId: "41E43503-A694-406E-B95A-689E4167A4FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A464B371-1B8B-4563-8728-969825896115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "120EA9E3-788B-4CFD-A74F-17111FFD0131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "6B4C2FBB-FEA0-4B98-8568-705FFFFFBB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "B2506FCC-4B0F-4FEF-A44E-0C704B6217F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "9D9F2F31-B378-40FE-B012-000A225B76F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D014FF7B-BBEA-4F80-BE0E-4C70E4585A1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "C8257676-7AA7-4B39-A8F8-685843D0685B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "31001EA8-2C65-4D3D-AEC7-F298692E8752",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
                     matchCriteriaId: "33A3ECF9-AA4D-41F9-8441-1EB5F1DB882E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s10:*:*:*:*:*:*",
                     matchCriteriaId: "17C66198-8D9A-454C-B645-A040A5C1E12E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s11:*:*:*:*:*:*",
                     matchCriteriaId: "E0309A32-5087-4918-B1EE-10EC28F50B2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s12:*:*:*:*:*:*",
                     matchCriteriaId: "28CB995B-97C5-4FC4-B054-94835CE2B363",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
                     matchCriteriaId: "989D1170-C430-4117-8E3B-46D8B459DF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DB2FD851-BBB6-4D29-B933-1070564E0B50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "258A380C-1EA0-407D-B7E3-4A2E8820119C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "BBE35BDC-7739-4854-8BB8-E8600603DE9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2DC47132-9EEA-4518-8F86-5CD231FBFB61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CD5A30CE-9498-4007-8E66-FD0CC6CF1836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "07CD1E7C-24EA-46B7-964C-C78FF64AFAE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
                     matchCriteriaId: "8A457C57-4A36-433D-9473-5ABC091DF316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "F2E0A48F-C85B-4973-A054-28A888EA5ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "6D3E38C1-808C-4BD3-993D-F30855F5390F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
                     matchCriteriaId: "C2AF9C4B-23E6-485D-A115-2B728E929C6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1FD11073-DC27-41F8-A6A2-7E22A062D14E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
                     matchCriteriaId: "2A78389E-868C-422D-9AA3-8A672DF6C2AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
                     matchCriteriaId: "85BFC22F-A6B3-4306-A28B-5D78FFA6402D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
                     matchCriteriaId: "99276E50-825C-4BB4-8496-1F81BDA21655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "22B700C1-C690-4C7D-A5AE-45BBB550D52F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "50DDDE48-3F73-440F-82ED-BD9D62A407B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
                     matchCriteriaId: "72194CB7-FFDC-4897-9D6E-EA3459DDDEB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
                     matchCriteriaId: "C88635DB-09B1-4DA1-8FC3-2F7A7E42819C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "92F35C19-5AD2-4F98-8313-2E880714DF3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "DF5A9D31-ED7D-4390-B46D-7E46089DB932",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3BE0AD25-767F-4719-9BE4-C8BDF78A6C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "19684897-77CE-4E50-B9D2-25E6114E66A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "90B94472-0E32-48AD-A690-AABB2C53CA58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "6B4A4960-0241-4BF4-8857-8B7BE33466B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C2DC367C-7F0B-4775-9BE9-464B28543D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
                     matchCriteriaId: "863744A8-8759-4646-9E39-72D511DE4A10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
                     matchCriteriaId: "732A499C-9FAC-4307-B090-8971970B3EF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
                     matchCriteriaId: "9D3848D1-936D-44BB-B951-E4296F113641",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "9677CE18-B955-432F-BA2B-AAE3D0CA0F16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3661BC68-6F32-447F-8D20-FD73FBBED9C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "8008342F-4BF3-49D8-B516-C08AAF9E469E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5B6097D4-3856-4696-9A26-5B6C0FD9AD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84DD80BF-BF7E-447B-AA74-00B3D8036E36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "D8A72B62-E3B7-42FA-980F-75BDF15236FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "57B89EEB-222D-46AA-BC8F-4EE7E17BA7B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "ECAE613D-1317-4D2E-8A61-980CD5DEAED8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "BAB2D63C-C966-42CA-85A9-09820D00A2D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5A7231C6-1CC4-4E7A-A317-5315246D2540",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "B14E079B-4E8F-4DAC-85C7-ECC888EBD306",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "CC9B5CDE-3A50-4CD3-962A-FA0989939F37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "7572C187-4D58-4E0D-A605-B2B13EFF5C6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "3DE6E051-2F2F-4862-9001-5DA83C4BCF75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E34A149E-C2ED-4D86-A105-0A2775654AE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4E0D42C4-9B4D-44F9-BC84-E7994404598B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "CC7A70CD-3A5E-4F01-8469-E5CD406BB04F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "1733E9C1-05FF-4D84-8AE3-315A61288D9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "DE2C20D8-3C73-4B87-BA41-DBFBCA5FBA58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54D887B4-D2F4-4537-8298-B98D01396F12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1C1B5AE6-A323-4744-BCA1-25E46D2D27BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "0AB39E2F-0D67-4FA6-84B8-36684E971002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A32C3702-48DE-47CF-B0D1-3A629676AD03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "B9695B3E-FCDA-4DF0-B714-8B4F87AA647D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "36214C23-82C8-4A3E-9FF8-04F85FF8B2B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "F3778643-1684-4549-A764-A1909C14B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7D45F2C3-20FF-4A91-A440-E109B3CCE7C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "95473197-2553-4252-B5E5-CAF904C2EA6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B87ECEAD-FD18-4252-8D46-F281DD4125AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "11E055AC-5626-4EBB-8611-17BB1E8AEF15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "A283D32F-1CAF-4A5A-83E1-585F2801771F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "38A40E03-F915-4888-87B0-5950F75F097D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C52E355B-DA7D-4FDE-B2D7-A3C3C9C99918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "267A3603-BC18-442E-803A-4CAEB6493433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A2C7B980-033E-40AC-98C9-B252733B0F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
                     matchCriteriaId: "D1CAEBD2-2E46-44B5-B1D1-1DDBD450FD27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "565AE6D8-28A9-4A62-A886-5BAB954695D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C366F93-BB30-4144-99AE-40B676977834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "488BB10A-1360-42E5-A68D-23D51B332850",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "64988F0A-E02C-455B-99C9-4059C896416F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "0DFDD907-5305-4602-8A9C-685AA112C342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B0A756E2-C320-405A-B24F-7C5022649E5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6F4C1-6A7E-474F-89BC-7A3C50FD8CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84F5BCBA-404B-4BC9-B363-CE6D231B0D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18A4CA3E-DA61-49CC-8476-3A476CCB2B83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A7380B3E-09F5-4497-86C6-11EF56BD89F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "658841A9-BEC9-433E-81D0-47DE82887C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5AD05209-1274-4F8A-9FA2-A1A8DFCC5755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C97683B3-A07B-428F-9535-C49B55305679",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A14CE132-C56B-43D8-A248-AB6A2D1A7B6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
                     matchCriteriaId: "90BF177D-A895-4D05-B674-B27420A5DC6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by \"Range: x=,\".",
      },
      {
         lang: "es",
         value: "Embedthis Appweb anterior a 4.6.6 y 5.x anterior a 5.2.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo) a través de una cabecera de rango con un valor vacío, tal y como fue demostrado por 'Rango: x=,'.",
      },
   ],
   id: "CVE-2014-9708",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-03-31T14:59:07.313",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Apr/19",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Apr/19",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Mar/158",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Mar/158",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/03/28/2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/04/06/2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/535028/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/73407",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1037007",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Patch",
         ],
         url: "https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Exploit",
            "Issue Tracking",
         ],
         url: "https://github.com/embedthis/appweb/issues/413",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.paloaltonetworks.com/CVE-2014-9708",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Apr/19",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Apr/19",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Mar/158",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Mar/158",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/03/28/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2015/04/06/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/535028/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/73407",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1037007",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Patch",
         ],
         url: "https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Exploit",
            "Issue Tracking",
         ],
         url: "https://github.com/embedthis/appweb/issues/413",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.paloaltonetworks.com/CVE-2014-9708",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-17 22:15
Modified
2024-11-21 07:56
Summary
An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix <address/mask> extensive Session ID: <session ID>, Status: Normal, State: Active Policy name: <name of policy> Dynamic application: junos:UNKNOWN, <<<<< LOOK HERE Please note, the JDPI-Decoder and the AppID SigPack are both affected and both must be upgraded along with the operating system to address the matter. By default, none of this is auto-enabled for automatic updates. This issue affects: Juniper Networks any version of the JDPI-Decoder Engine prior to version 5.7.0-47 with the JDPI-Decoder enabled using any version of the AppID SigPack prior to version 1.550.2-31 (SigPack 3533) on Junos OS on SRX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2;
Impacted products
Vendor Product Version
juniper appid_service_sigpack *
juniper jdpi-decoder_engine *
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:appid_service_sigpack:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88CC4052-A3CE-43BD-8679-394E53D309A2",
                     versionEndExcluding: "1.550.2-31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:jdpi-decoder_engine:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "38342A55-48C8-425C-9FEE-A57DEE1870BA",
                     versionEndExcluding: "5.7.0-47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "92292C23-DC38-42F1-97C1-8416BBB60FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "59E2311C-075A-4C64-B614-728A21B17B1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "8120EAC3-DCCB-4429-A372-C0DAA3270A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DF81F459-915E-468C-8E82-85F1A601095B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "9912E998-75FB-4EA0-8E36-0A1C38147AB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C7AE90D0-D502-4262-A83E-F40308A81380",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "739E4B74-5769-4392-BAFE-39770B021859",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "2849078A-447A-4615-94E1-58AF450ED22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C2C625B6-25ED-4F6C-A778-6AB7FA7901CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*",
                     matchCriteriaId: "84EC3EE0-F1D9-4CBB-B3FA-83C05C50EB5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E38CD1E2-41F5-42D1-B915-055A497C576A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "0C816B9A-F152-4E5F-8152-73635840A89A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E0EA9DA-2DAD-4FA4-8CCC-E2F3D7069305",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "F56182CE-376A-4B77-BB53-1E988842AEC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "55F3E730-83F2-43C2-B6DC-77BAABB2F01D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "45DA4D89-1362-421F-8218-585CE5D60E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "EEA350A8-9441-496C-A86C-0D209190A178",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "7F449CD5-9D3D-4D99-8A6F-8C7946A4F2D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "1BBF56BB-939A-4E38-BD9E-E3198E70F8E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "19EAC3C9-D800-436F-8FEA-8BDFB5A9BD24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "5C238EB1-5A38-4877-8849-4A6D36918B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D621DB7F-BC6B-4A07-8803-596B3ED11CF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A5620596-4DEE-41D7-A63F-224D814DAA77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A8BBCEC0-5915-4F69-90FD-070A94145BB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D3C93B13-DCEB-4861-87DC-3F1ECBAF7FFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5887B680-E5A4-4A30-9543-69B42F50E8D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E5E3FDB-3F33-4686-9B64-0152AD41939D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9C411A2E-A407-44E5-A2B2-3D049FB2DB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "7B798133-105C-448B-B06E-57327E44E478",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "D0D7DB4B-683B-408B-8055-2C992CA43FFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "5C1C3B09-3800-493E-A319-57648305FE6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through. An example session can be seen by running the following command and evaluating the output. user@device# run show security flow session source-prefix <address/mask> extensive Session ID: <session ID>, Status: Normal, State: Active Policy name: <name of policy> Dynamic application: junos:UNKNOWN, <<<<< LOOK HERE Please note, the JDPI-Decoder and the AppID SigPack are both affected and both must be upgraded along with the operating system to address the matter. By default, none of this is auto-enabled for automatic updates. This issue affects: Juniper Networks any version of the JDPI-Decoder Engine prior to version 5.7.0-47 with the JDPI-Decoder enabled using any version of the AppID SigPack prior to version 1.550.2-31 (SigPack 3533) on Junos OS on SRX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2;",
      },
   ],
   id: "CVE-2023-28968",
   lastModified: "2024-11-21T07:56:18.537",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-17T22:15:08.960",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA70592",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Product",
         ],
         url: "https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Release Notes",
         ],
         url: "https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA70592",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://supportportal.juniper.net/s/article/SRX-How-to-update-IDP-signature-database-automatically-on-a-SRX",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1325",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-01-16 20:29
Modified
2024-11-21 03:24
Summary
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
References
security-officer@isc.orghttp://www.securityfocus.com/bid/102716Broken Link, Third Party Advisory, VDB Entry
security-officer@isc.orghttp://www.securitytracker.com/id/1040195Broken Link, Third Party Advisory, VDB Entry
security-officer@isc.orghttps://access.redhat.com/errata/RHSA-2018:0101Third Party Advisory
security-officer@isc.orghttps://access.redhat.com/errata/RHSA-2018:0102Third Party Advisory
security-officer@isc.orghttps://access.redhat.com/errata/RHSA-2018:0487Third Party Advisory
security-officer@isc.orghttps://access.redhat.com/errata/RHSA-2018:0488Third Party Advisory
security-officer@isc.orghttps://kb.isc.org/docs/aa-01542Vendor Advisory
security-officer@isc.orghttps://lists.debian.org/debian-lts-announce/2018/01/msg00029.htmlMailing List, Third Party Advisory
security-officer@isc.orghttps://security.netapp.com/advisory/ntap-20180117-0003/Third Party Advisory
security-officer@isc.orghttps://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-namedThird Party Advisory
security-officer@isc.orghttps://www.debian.org/security/2018/dsa-4089Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/102716Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1040195Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:0101Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:0102Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:0487Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:0488Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/docs/aa-01542Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/01/msg00029.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20180117-0003/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-namedThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4089Third Party Advisory
Impacted products
Vendor Product Version
isc bind *
isc bind *
isc bind *
isc bind *
isc bind 9.9.3
isc bind 9.9.11
isc bind 9.10.5
isc bind 9.10.6
isc bind 9.12.0
isc bind 9.12.0
isc bind 9.12.0
isc bind 9.12.0
redhat enterprise_linux_desktop 6.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_server 6.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 6.4
redhat enterprise_linux_server_aus 6.5
redhat enterprise_linux_server_aus 6.6
redhat enterprise_linux_server_aus 7.2
redhat enterprise_linux_server_aus 7.3
redhat enterprise_linux_server_aus 7.4
redhat enterprise_linux_server_aus 7.6
redhat enterprise_linux_server_eus 6.7
redhat enterprise_linux_server_eus 7.3
redhat enterprise_linux_server_eus 7.4
redhat enterprise_linux_server_eus 7.5
redhat enterprise_linux_server_eus 7.6
redhat enterprise_linux_server_tus 6.6
redhat enterprise_linux_server_tus 7.2
redhat enterprise_linux_server_tus 7.3
redhat enterprise_linux_server_tus 7.6
redhat enterprise_linux_workstation 6.0
redhat enterprise_linux_workstation 7.0
debian debian_linux 7.0
debian debian_linux 8.0
debian debian_linux 9.0
netapp data_ontap_edge -
juniper junos 12.1x46-d76
juniper junos 12.3x48-d70
juniper junos 15.1x49-d140
juniper junos 17.4r2
juniper junos 18.1r2
juniper junos 18.2r1
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "343E9DD3-BBEA-4385-9A8E-0675BE74EC43",
                     versionEndIncluding: "9.8.8",
                     versionStartIncluding: "9.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EFFE58B-0BAE-43FF-94BD-F03D0FC31BC4",
                     versionEndIncluding: "9.9.11",
                     versionStartIncluding: "9.9.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD179483-9754-4498-AE38-4CF1EB8F4063",
                     versionEndIncluding: "9.10.6",
                     versionStartIncluding: "9.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E5186B7-78C5-486D-97D7-E64B9709ED65",
                     versionEndIncluding: "9.11.2",
                     versionStartIncluding: "9.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*",
                     matchCriteriaId: "FCC182A9-5989-4A87-A3BA-F1CFAEDC95E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.11:s1:*:*:*:*:*:*",
                     matchCriteriaId: "1B9BC3D9-B2F6-4995-A757-E1BB68BC7F8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.5:s1:*:*:*:*:*:*",
                     matchCriteriaId: "82A6F259-EB06-4F31-9F68-A76F257756DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.6:s1:*:*:*:*:*:*",
                     matchCriteriaId: "9B6C3FDB-B57C-4DF5-AFDB-EEF17F5DAE08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.12.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "646FE55D-D8DF-483E-8DBE-65FB8A3FC18B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.12.0:b1:*:*:*:*:*:*",
                     matchCriteriaId: "1653E806-4F31-4ACA-B51F-5F0067D99208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.12.0:b2:*:*:*:*:*:*",
                     matchCriteriaId: "8E5AB236-CBDE-48F3-B6E1-5C6B08996ED7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.12.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "F57F84D2-76D0-42B9-BA61-96204F527B7A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BBCD86A-E6C7-4444-9D74-F861084090F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF83BB87-B203-48F9-9D06-48A5FE399050",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "16E6D998-B41D-4B49-9E00-8336D2E40A4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C8D871B-AEA1-4407-AEE3-47EC782250FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "98381E61-F082-4302-B51F-5648884F998B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B353CE99-D57C-465B-AAB0-73EF581127D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C81647C-9A53-481D-A54C-36770A093F90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8442C20-41F9-47FD-9A12-E724D3A31FD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "13E02156-E748-4820-B76F-7074793837E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6755B6AD-0422-467B-8115-34A60B1D1A40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2BAF7-8D71-474C-9F72-FF5DABC69749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48-d70:-:*:*:*:*:*:*",
                     matchCriteriaId: "EAB0418C-F53F-4CA9-9AC3-4735A06B19C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49-d140:-:*:*:*:*:*:*",
                     matchCriteriaId: "63C3C7CE-3877-462F-ACAE-61E196D6F1B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4r2:-:*:*:*:*:*:*",
                     matchCriteriaId: "BF8F91A3-DAC7-42E7-8722-17C57115F9AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1r2:-:*:*:*:*:*:*",
                     matchCriteriaId: "E33DCDB7-DE93-406F-AF78-BD3D9E8D4E2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2r1:-:*:*:*:*:*:*",
                     matchCriteriaId: "B6F40716-E190-4C67-BCF8-831069B95398",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.",
      },
      {
         lang: "es",
         value: "BIND secuenciaba incorrectamente las operaciones de limpieza en contextos fetch de recursión ascendente, lo que conduce en algunos casos a un error de uso de memoria previamente liberada que puede desencadenar un fallo de aserción y un cierre inesperado en named. Afecta a BIND desde la versión 9.0.0 hasta la versión 9.8.x, desde la versión 9.9.0 hasta la versión 9.9.11, desde la versión 9.10.0 hasta la versión 9.10.6, desde la versión 9.11.0 hasta la versión 9.11.2, desde la versión 9.9.3-S1 hasta la versión 09.9.11-S1, desde la versión 9.10.5-S1 hasta la versión 9.10.6-S1 y desde la 9.12.0a1 hasta la 9.12.0rc1.",
      },
   ],
   id: "CVE-2017-3145",
   lastModified: "2024-11-21T03:24:55.717",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "security-officer@isc.org",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-01-16T20:29:00.690",
   references: [
      {
         source: "security-officer@isc.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/102716",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1040195",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0101",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0102",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0487",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0488",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/docs/aa-01542",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180117-0003/",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4089",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/102716",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1040195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0101",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0102",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:0488",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/docs/aa-01542",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180117-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://supportportal.juniper.net/s/article/2018-07-Security-Bulletin-SRX-Series-Vulnerabilities-in-ISC-BIND-named",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2018/dsa-4089",
      },
   ],
   sourceIdentifier: "security-officer@isc.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.
Impacted products
Vendor Product Version
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "45DA4D89-1362-421F-8218-585CE5D60E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "1BBF56BB-939A-4E38-BD9E-E3198E70F8E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E5E3FDB-3F33-4686-9B64-0152AD41939D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Missing Release of Memory after Effective Lifetime en el Flow Processing Daemon (flowd) de Juniper Networks Junos OS permite que un atacante no autenticado basado en la red provoque una denegación de servicio (DoS). En un entorno VPN IPsec, se observará una pérdida de memoria si se configura un grupo DH o ECDH. Finalmente, el proceso fluido fallará y se reiniciará. Este problema afecta a Juniper Networks Junos OS en la serie SRX: todas las versiones anteriores a 19.3R3-S7; Versiones 19.4 anteriores a 19.4R2-S8, 19.4R3-S10; Versiones 20.2 anteriores a 20.2R3-S6; Versiones 20.3 anteriores a 20.3R3-S5; Versiones 20.4 anteriores a 20.4R3-S5; Versiones 21.1 anteriores a 21.1R3-S4; Versiones 21.2 anteriores a 21.2R3; Versiones 21.3 anteriores a 21.3R3; Versiones 21.4 anteriores a 21.4R2.",
      },
   ],
   id: "CVE-2023-22417",
   lastModified: "2024-11-21T07:44:46.693",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:11.830",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70213",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70213",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-03-09 23:59
Modified
2025-04-12 10:46
Summary
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.htmlMailing List
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.htmlMailing List
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.htmlMailing List
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.htmlMailing List
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.htmlMailing List
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0562.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0601.htmlThird Party Advisory
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3511Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlThird Party Advisory
cve@mitre.orghttp://www.securitytracker.com/id/1035236Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2925-1Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821Third Party Advisory
cve@mitre.orghttps://kb.isc.org/article/AA-01352Vendor Advisory
cve@mitre.orghttps://kb.isc.org/article/AA-01380Broken Link, Release Notes
cve@mitre.orghttps://kb.isc.org/article/AA-01438Broken Link
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.ascThird Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201610-07Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0562.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0601.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3511Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035236Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2925-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-01352Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-01380Broken Link, Release Notes
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-01438Broken Link
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-07Third Party Advisory
Impacted products
Vendor Product Version
isc bind *
isc bind *
isc bind 9.9.8
isc bind 9.9.8
isc bind 9.9.8
isc bind 9.9.8
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
suse linux_enterprise_debuginfo 11
suse linux_enterprise_debuginfo 11
suse linux_enterprise_debuginfo 11
suse manager 2.1
suse manager_proxy 2.1
suse openstack_cloud 5
opensuse leap 42.1
opensuse opensuse 11.4
opensuse opensuse 13.1
opensuse opensuse 13.2
suse linux_enterprise_desktop 11
suse linux_enterprise_desktop 12
suse linux_enterprise_desktop 12
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 12
suse linux_enterprise_server 12
suse linux_enterprise_software_development_kit 11
suse linux_enterprise_software_development_kit 12
suse linux_enterprise_software_development_kit 12
fedoraproject fedora 22
fedoraproject fedora 23
fedoraproject fedora 24
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10
debian debian_linux 7.0
debian debian_linux 8.0
debian debian_linux 9.0
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46-d10
juniper junos 12.1x46-d76
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper vsrx -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx1600 -
juniper srx210 -
juniper srx220 -
juniper srx2300 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4300 -
juniper srx4600 -
juniper srx4700 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A842D7E6-54A8-44C8-A241-1CE8B7B8BDAE",
                     versionEndExcluding: "9.9.8",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B076C1-84ED-4924-B65A-994A23B78345",
                     versionEndExcluding: "9.10.3",
                     versionStartIncluding: "9.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:-:*:*:*:*:*:*",
                     matchCriteriaId: "B41581B6-E576-4273-A2B8-CDB1AD1497B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*",
                     matchCriteriaId: "B02B1665-1283-4B0B-9AD2-827C8BEFCF3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:p3:*:*:*:*:*:*",
                     matchCriteriaId: "A7CE97C3-AE65-407B-B209-9809923732AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "86C0C8FC-6004-4DFF-919C-068DEC26FA6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4C46844-7B97-4EBA-9B9D-715498B5FEEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BF170094-2C93-4630-A827-C2335D75425B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*",
                     matchCriteriaId: "88359A5D-CE32-4920-BE5D-98EC262B41EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*",
                     matchCriteriaId: "B77760E4-57C5-4A5E-A169-C84409930757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*",
                     matchCriteriaId: "24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "893ACAAC-406E-4A1C-970B-A15B42961271",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D5900A25-FDD7-4900-BF7C-F3ECCB714D2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "58D3B6FD-B474-4B09-B644-A8634A629280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "F892F1B0-514C-42F7-90AE-12ACDFDC1033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD4EEF7C-CC33-4494-8531-7C0CC28A8823",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CBED083-B935-4C47-BBDA-F39D8EA277ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD6136E8-74DE-48AF-A8AB-B0E93D34870C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE554781-1EB9-446E-911F-6C11970C47F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                     matchCriteriaId: "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "3A0BA503-3F96-48DA-AF47-FBA37A9D0C48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
                     matchCriteriaId: "CB6476C7-03F2-4939-AB85-69AA524516D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
                     matchCriteriaId: "B12243B2-D726-404C-ABFF-F1AB51BA1783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                     matchCriteriaId: "15FC9014-BD85-4382-9D04-C0703E901D7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "2076747F-A98E-4DD9-9B52-BF1732BCAD3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "D41A798E-0D69-43C7-9A63-1E5921138EAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
                     matchCriteriaId: "1831D45A-EE6E-4220-8F8C-248B69520948",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "5A633996-2FD7-467C-BAA6-529E16BD06D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "253C303A-E577-4488-93E6-68A8DD942C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                     matchCriteriaId: "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                     matchCriteriaId: "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                     matchCriteriaId: "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E88A537F-F4D0-46B9-9E37-965233C2A355",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*",
                     matchCriteriaId: "92F31F7F-02E0-4E63-A600-DF8AB4E3BAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
                     matchCriteriaId: "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
                     matchCriteriaId: "4FD4237A-C257-4D8A-ABC4-9B2160530A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5A449C87-C5C3-48FE-9E46-64ED5DD5F193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
                     matchCriteriaId: "F4B6215F-76BF-473F-B325-0975B0EB101E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
                     matchCriteriaId: "A1C4A10C-49A3-4103-9E56-F881113BC5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
                     matchCriteriaId: "50E7FD07-A309-48EC-A520-C7F0FA35865C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F868948A-04D7-473B-971F-721302653633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
                     matchCriteriaId: "830A9EBA-88F1-4277-B98F-75AC52A60824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
                     matchCriteriaId: "BFA2ADAB-E486-4DBB-8B84-CC095D102278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
                     matchCriteriaId: "9ACD0C03-ACD9-4D47-B3EE-1D8753FF5A83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
                     matchCriteriaId: "0DD32D8A-7531-4691-B45D-9EACC69A23D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*",
                     matchCriteriaId: "76DFA52F-5B2E-47DA-9A8E-7D17A7413929",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d66:*:*:*:*:*:*",
                     matchCriteriaId: "4D363E73-ABC4-4E9F-9E7B-86087D3A3F9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d67:*:*:*:*:*:*",
                     matchCriteriaId: "A7502F95-BADC-432A-B7BE-8E9931FA1448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d70:*:*:*:*:*:*",
                     matchCriteriaId: "9451CD3F-BF4E-4BBC-AD00-660BE2B313C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d71:*:*:*:*:*:*",
                     matchCriteriaId: "C63E8B17-250D-4D74-9A1F-2F3577D9A071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d72:*:*:*:*:*:*",
                     matchCriteriaId: "801AB7D7-3407-4F8B-83C4-CC16076DB0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d73:*:*:*:*:*:*",
                     matchCriteriaId: "FA4104D4-3FA2-4936-ACBD-06B0BD0B9E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*",
                     matchCriteriaId: "090BB276-C169-4A41-B03D-0EC40D20E8BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*",
                     matchCriteriaId: "51732A2B-52E2-4356-8409-5CB6D79F23DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46-d10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6390879-1AB9-4B11-A8A8-6B914F52EB83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2BAF7-8D71-474C-9F72-FF5DABC69749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*",
                     matchCriteriaId: "AC1FED64-8725-4978-9EBF-E3CD8EF338E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
                     matchCriteriaId: "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
                     matchCriteriaId: "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5FF83BD0-3B28-481E-8C8F-09ECDA493DA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6E296274-AFC1-4F56-A4B3-827C2E0BC9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
                     matchCriteriaId: "3C82799B-BD25-4359-9E3D-4D7CA7367525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
                     matchCriteriaId: "094485FF-960C-4533-A2AF-6C4D420D260D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F8BE3661-1DE5-4F57-9384-68C1B34F6812",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
                     matchCriteriaId: "B45E8A14-E7F4-41EB-9BFA-7A19E35D11FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
                     matchCriteriaId: "C6C694C6-C58C-4513-91E8-6CC22A2386E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d51:*:*:*:*:*:*",
                     matchCriteriaId: "64A0CCD4-91BA-440E-A14C-48E67D1F03A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
                     matchCriteriaId: "6B65EF51-ED97-4973-94C4-8F66C553F190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
                     matchCriteriaId: "9EE7C08A-2A4B-4A84-AD95-A890913E2EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*",
                     matchCriteriaId: "44C61900-680C-4C74-8B96-ACC93FE9465E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*",
                     matchCriteriaId: "6A793CCD-397E-45DA-9349-D01C69AB96D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*",
                     matchCriteriaId: "B6C38637-ABE0-419A-A053-CBE076766551",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*",
                     matchCriteriaId: "1F87EF0D-E609-4D4A-B228-CEF05C753E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
                     matchCriteriaId: "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
                     matchCriteriaId: "856A5668-FA4F-44E9-A3F0-BE4979F631E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
                     matchCriteriaId: "F3B2DA4D-5E5D-4E09-BE4D-5B3371703D8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
                     matchCriteriaId: "FA2459ED-DFA5-4701-AF92-C2928C3BD64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
                     matchCriteriaId: "8830C4BC-2B3D-4CCF-A37E-79C2D46159BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
                     matchCriteriaId: "40D42ACF-860C-4B47-8E25-7DEC30FB8064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
                     matchCriteriaId: "C808E08F-1992-43DD-A106-E920DC784831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*",
                     matchCriteriaId: "C8C94365-988C-4A14-8E49-846152FDC666",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
                     matchCriteriaId: "E288F54B-AEA3-412F-85A4-EBDFE74DB84F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*",
                     matchCriteriaId: "02AAC05C-1C4B-4F35-A286-52D20DFD6212",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
                     matchCriteriaId: "080422D3-B508-4049-B558-4B04BF2E8AB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:*",
                     matchCriteriaId: "2FAFD8F8-CBD2-45CA-BD3C-875C8FA1D778",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
                     matchCriteriaId: "18468579-0195-4DDE-BAA5-4BE4068F3A69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6825F6BA-B48F-4E02-938F-6B297E21BA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
                     matchCriteriaId: "0E5FAA97-171F-4DB9-B78E-6E1A5F34336A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
                     matchCriteriaId: "870244F3-1C05-4F10-A205-5189BB860F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
                     matchCriteriaId: "235EE40B-AA15-4F39-8087-A051F4F70995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
                     matchCriteriaId: "17330544-3AFC-463E-A146-2840A8AE17D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA301F-7866-42A5-8391-E07BEAFF06FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
                     matchCriteriaId: "884E4A85-ED42-4391-9FDD-9052F957743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
                     matchCriteriaId: "1901864B-688B-4352-A587-4B96B4E49FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
                     matchCriteriaId: "78F53FBF-C6D8-4AE5-87EC-9D9F88DCEFB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
                     matchCriteriaId: "1B6670FB-9F5A-469B-97F2-074C28572065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
                     matchCriteriaId: "71198992-83AA-4E28-BA7D-A3C1897B5E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
                     matchCriteriaId: "4323D874-C317-4D76-8E2D-C82376D84CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
                     matchCriteriaId: "F56067DA-EBA9-481A-B60B-52148584EFBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "A283D32F-1CAF-4A5A-83E1-585F2801771F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "38A40E03-F915-4888-87B0-5950F75F097D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C52E355B-DA7D-4FDE-B2D7-A3C3C9C99918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "267A3603-BC18-442E-803A-4CAEB6493433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A2C7B980-033E-40AC-98C9-B252733B0F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BA8D32E4-1892-46DC-9782-5466A14E18D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "25C7C3D0-A203-4979-8375-A610ADD48E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
                     matchCriteriaId: "D1CAEBD2-2E46-44B5-B1D1-1DDBD450FD27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "565AE6D8-28A9-4A62-A886-5BAB954695D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C366F93-BB30-4144-99AE-40B676977834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "488BB10A-1360-42E5-A68D-23D51B332850",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "64988F0A-E02C-455B-99C9-4059C896416F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "DC2ACA85-FA89-40F0-A2AD-778E1CB02A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9F431D3D-5D55-45A9-98E8-00CB1D4C0196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "F0F65DCA-34B9-4CE8-91C9-426AAAEB4097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "341417EE-71C2-465C-96CA-65B2B5B63FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "A701A73D-A795-47DD-8EB5-55D1CDF67A49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*",
                     matchCriteriaId: "CC1EE8D6-8963-49D8-84C7-C9406B04D9EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s13:*:*:*:*:*:*",
                     matchCriteriaId: "03BCD35E-29D3-4F8C-ABE9-32C7010FD796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "4EC7D216-D8F3-4ABD-97C9-4C9FB6DF64FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5E327643-D8D8-4EFA-9F38-BA862A919501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "1BC6CE1C-9DD8-429E-BDC2-251D8C8674E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "63B00B4F-3E65-4CB2-807D-43908B570AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "0DFDD907-5305-4602-8A9C-685AA112C342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B0A756E2-C320-405A-B24F-7C5022649E5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6F4C1-6A7E-474F-89BC-7A3C50FD8CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84F5BCBA-404B-4BC9-B363-CE6D231B0D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18A4CA3E-DA61-49CC-8476-3A476CCB2B83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A7380B3E-09F5-4497-86C6-11EF56BD89F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "658841A9-BEC9-433E-81D0-47DE82887C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5AD05209-1274-4F8A-9FA2-A1A8DFCC5755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s13:*:*:*:*:*:*",
                     matchCriteriaId: "F144834D-7FC0-4B60-AFCB-AD86BA121719",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C97683B3-A07B-428F-9535-C49B55305679",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A14CE132-C56B-43D8-A248-AB6A2D1A7B6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "73978DD8-BD92-4872-8F35-AF2B9BCA1ECB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "678F57D1-2595-4AF3-BB87-AF2E1FE3CBB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7988CE92-71D2-4EEC-B596-4A60E2C1136A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "330D176F-8DAD-440C-A623-44FA233FAB01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "8CC5EAB8-1364-4325-9F01-BE7CC479C29D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "238EC996-8E8C-4332-916F-09E54E6EBB9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EEFCDA90-67E2-4AEF-800C-1D29A9121B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "74B99981-840F-4DAD-976A-5DAEFE9FB93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BDD3ADB9-35FF-41D3-92BD-98D6D4826B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "341F2459-8335-40E9-A2B3-BE804D319F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "0CD17956-8E8C-489D-927A-5709C05EA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "27D9AEBC-2CA3-4E17-9543-D60B10BA2AE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F68E75-E6C6-4DB4-AE0E-C5637ECE7C88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.",
      },
      {
         lang: "es",
         value: "named en ISC BIND 9.x en versiones anteriores a 9.9.8-P4 y 9.10.x en versiones anteriores a 9.10.3-P4 no maneja adecuadamente los archivos DNAME cuando analiza gramaticalmente la recuperación de mensajes contestados, lo que permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y salida de demonio) a través de un paquete mal formado en la interfaz rndc (también conocido como canal de control), relacionado con alist.c y sexpr.c.",
      },
   ],
   id: "CVE-2016-1285",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-03-09T23:59:02.133",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3511",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1035236",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2925-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01352",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Release Notes",
         ],
         url: "https://kb.isc.org/article/AA-01380",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://kb.isc.org/article/AA-01438",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201610-07",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3511",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1035236",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2925-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01352",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Release Notes",
         ],
         url: "https://kb.isc.org/article/AA-01380",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://kb.isc.org/article/AA-01438",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201610-07",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
Impacted products
Vendor Product Version
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Improper Locking en SIP ALG de Juniper Networks Junos OS en la serie MX con tarjeta MS-MPC o MS-MIC y serie SRX permite que un atacante basado en red no autenticado provoque un bloqueo del Flow Processing Daemon (flowd) y, por lo tanto, una denegación de Servicio (DoS). La recepción continua de estos paquetes específicos provocará una condición sostenida de Denegación de Servicio. Este problema ocurre cuando SIP ALG está habilitado y mensajes SIP específicos se procesan simultáneamente. Este problema afecta a: Juniper Networks Junos OS en las versiones MX Series y SRX Series 20.4 anteriores a 20.4R3-S4; Versiones 21.1 anteriores a 21.1R3-S3; Versiones 21.2 anteriores a 21.2R3-S2; Versiones 21.3 anteriores a 21.3R3; Versiones 21.4 anteriores a 21.4R3; Versiones 22.1 anteriores a 22.1R2. Este problema no afecta a las versiones de Juniper Networks Junos OS anteriores a 20.4R1 en la serie MX o la serie SRX.",
      },
   ],
   id: "CVE-2023-22412",
   lastModified: "2024-11-21T07:44:46.020",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:11.450",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70208",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70208",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-667",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-667",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-10-19 19:15
Modified
2024-11-21 06:05
Summary
A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensitive data and credentials from a web administration session, or hijack another user's active session to perform administrative actions. This issue affects: Juniper Networks Junos OS on SRX Series: 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3.
Impacted products
Vendor Product Version
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "238EC996-8E8C-4332-916F-09E54E6EBB9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EEFCDA90-67E2-4AEF-800C-1D29A9121B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "74B99981-840F-4DAD-976A-5DAEFE9FB93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BDD3ADB9-35FF-41D3-92BD-98D6D4826B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "341F2459-8335-40E9-A2B3-BE804D319F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "0CD17956-8E8C-489D-927A-5709C05EA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "27D9AEBC-2CA3-4E17-9543-D60B10BA2AE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B670F988-78F2-4BC6-B7FC-E34C280F67DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2F9451C7-6466-4AC9-9A7F-90A2817AED6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "871CA952-C5EC-4A25-8EF0-C2EC484F7DE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "80E2AD65-3DAC-4618-AB73-C43EDCDC7A13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "B783A510-A694-4BF0-8995-F05507F75A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C9CAAF7C-9876-473A-BE83-16EA8F00E8C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "3E4F0A1E-B15E-44C3-A55D-8AC016915451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "F2DEF924-0165-41B5-8A9D-A75596433CD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "B7A3FBD3-5399-42A9-9BD9-E3C981CBD6DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD361C-8B4D-43EF-8B82-9FE165D8206E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6E7539C4-6208-43EB-9A0B-4852D0CE0FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "35299B02-DC75-458D-B86D-8A0DB95B06AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC3EF2-3339-4E3C-9C6D-E854EBBDEF9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CFB29C9B-9729-43EB-AF98-AF44038DA711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2D1FB957-54C8-428E-BC8D-2802D7F6895F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A0BC4766-4BA4-4B02-A654-5C527EA66E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BB8263A9-5D63-46A2-9C98-B3980910B612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "75F125DC-3A21-489F-B324-A586F5BA350A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "2C1601BB-CAB7-4C92-8416-1824BB85D820",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "14FC491D-8DA8-4E79-A9A6-3629E41C847A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "92292C23-DC38-42F1-97C1-8416BBB60FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "59E2311C-075A-4C64-B614-728A21B17B1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensitive data and credentials from a web administration session, or hijack another user's active session to perform administrative actions. This issue affects: Juniper Networks Junos OS on SRX Series: 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de tipo Cross-Site Scripting (XSS) persistente en Juniper Networks Junos OS en la serie SRX, la interfaz J-Web puede permitir que un usuario remoto autenticado inyecte scripts persistentes y maliciosos. Un atacante puede aprovechar esta vulnerabilidad para robar datos confidenciales y credenciales de una sesión de administración web, o secuestrar la sesión activa de otro usuario para llevar a cabo acciones administrativas. Este problema afecta a: Juniper Networks Junos OS Serie SRX: versiones 18.2 anteriores a 18.2R3-S8; versiones 18.3 anteriores a 18.3R3-S5; versiones 18.4 anteriores a 18.4R3-S8; versiones 19.1 anteriores a 19.1R3-S5; versiones 19.2 anteriores a 19.2R1-S7, 19.2R3-S3; versiones 19.3 anteriores a 19. 3R2-S6, 19.3R3-S3; versiones 19.4 anteriores a 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; versiones 20.1 anteriores a 20.1R2-S2, 20.1R3; versiones 20.2 anteriores a 20.2R3-S1; versiones 20.3 anteriores a 20.3R2-S1, 20.3R3",
      },
   ],
   id: "CVE-2021-31373",
   lastModified: "2024-11-21T06:05:32.573",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.1,
            impactScore: 5.9,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-10-19T19:15:10.400",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11238",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11238",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-08-17 20:15
Modified
2025-01-27 21:39
Summary
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   cisaActionDue: "2023-11-17",
   cisaExploitAdd: "2023-11-13",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "5C1C3B09-3800-493E-A319-57648305FE6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n  *  All versions prior to 20.4R3-S8;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S6;\n  *  21.3 versions \n\nprior to \n\n 21.3R3-S5;\n  *  21.4 versions \n\nprior to \n\n21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S3;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: \n* All versions prior to 20.4R3-S8; \n* 21.1: versions 21.1R1 and later; \n* 21.2: versions prior to 21.2R3-S6; \n* 21.3: versions prior to 21.3R3-S5; \n* 21.4: versions prior to 21.4R3-S5; \n* 22.1: versions prior to 22.1R3-S3; \n* 22.2: versions prior to 22.2R3-S2; \n* 22.3: versions prior to 22.3R2-S2, 22.3R3; \n* 22.4: versions prior to 22.4R2-S1, 22.4R3.",
      },
   ],
   id: "CVE-2023-36846",
   lastModified: "2025-01-27T21:39:36.497",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-17T20:15:10.457",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA72300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA72300",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-03-09 23:59
Modified
2025-04-12 10:46
Summary
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.htmlThird Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0562.htmlThird Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2016-0601.htmlThird Party Advisory
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3511Third Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlThird Party Advisory
cve@mitre.orghttp://www.securitytracker.com/id/1035237Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2925-1Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821Third Party Advisory
cve@mitre.orghttps://kb.isc.org/article/AA-01353Vendor Advisory
cve@mitre.orghttps://kb.isc.org/article/AA-01380Release Notes, Vendor Advisory
cve@mitre.orghttps://kb.isc.org/article/AA-01438Broken Link, Vendor Advisory
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.ascThird Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201610-07Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=146191105921542&w=2Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0562.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0601.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3511Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035237Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2925-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-01353Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-01380Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-01438Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-07Third Party Advisory
Impacted products
Vendor Product Version
isc bind *
isc bind *
isc bind 9.9.8
isc bind 9.9.8
isc bind 9.9.8
isc bind 9.9.8
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
isc bind 9.10.3
suse linux_enterprise_debuginfo 11
suse linux_enterprise_debuginfo 11
suse linux_enterprise_debuginfo 11
suse manager 2.1
suse manager_proxy 2.1
suse openstack_cloud 5
opensuse leap 42.1
opensuse opensuse 11.4
opensuse opensuse 13.1
opensuse opensuse 13.2
suse linux_enterprise_desktop 11
suse linux_enterprise_desktop 12
suse linux_enterprise_desktop 12
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 12
suse linux_enterprise_server 12
suse linux_enterprise_software_development_kit 11
suse linux_enterprise_software_development_kit 12
suse linux_enterprise_software_development_kit 12
fedoraproject fedora 22
fedoraproject fedora 23
fedoraproject fedora 24
canonical ubuntu_linux 12.04
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10
debian debian_linux 7.0
debian debian_linux 8.0
debian debian_linux 9.0
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46-d10
juniper junos 12.1x46-d76
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper vsrx -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx1600 -
juniper srx210 -
juniper srx220 -
juniper srx2300 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4300 -
juniper srx4600 -
juniper srx4700 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A842D7E6-54A8-44C8-A241-1CE8B7B8BDAE",
                     versionEndExcluding: "9.9.8",
                     versionStartIncluding: "9.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B076C1-84ED-4924-B65A-994A23B78345",
                     versionEndExcluding: "9.10.3",
                     versionStartIncluding: "9.10.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:-:*:*:*:*:*:*",
                     matchCriteriaId: "B41581B6-E576-4273-A2B8-CDB1AD1497B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:p2:*:*:*:*:*:*",
                     matchCriteriaId: "B02B1665-1283-4B0B-9AD2-827C8BEFCF3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:p3:*:*:*:*:*:*",
                     matchCriteriaId: "A7CE97C3-AE65-407B-B209-9809923732AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "86C0C8FC-6004-4DFF-919C-068DEC26FA6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4C46844-7B97-4EBA-9B9D-715498B5FEEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "BF170094-2C93-4630-A827-C2335D75425B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*",
                     matchCriteriaId: "88359A5D-CE32-4920-BE5D-98EC262B41EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*",
                     matchCriteriaId: "B77760E4-57C5-4A5E-A169-C84409930757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*",
                     matchCriteriaId: "24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "893ACAAC-406E-4A1C-970B-A15B42961271",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "D5900A25-FDD7-4900-BF7C-F3ECCB714D2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "58D3B6FD-B474-4B09-B644-A8634A629280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "F892F1B0-514C-42F7-90AE-12ACDFDC1033",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD4EEF7C-CC33-4494-8531-7C0CC28A8823",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CBED083-B935-4C47-BBDA-F39D8EA277ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD6136E8-74DE-48AF-A8AB-B0E93D34870C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4863BE36-D16A-4D75-90D9-FD76DB5B48B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE554781-1EB9-446E-911F-6C11970C47F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                     matchCriteriaId: "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "3A0BA503-3F96-48DA-AF47-FBA37A9D0C48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
                     matchCriteriaId: "CB6476C7-03F2-4939-AB85-69AA524516D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
                     matchCriteriaId: "B12243B2-D726-404C-ABFF-F1AB51BA1783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                     matchCriteriaId: "15FC9014-BD85-4382-9D04-C0703E901D7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "2076747F-A98E-4DD9-9B52-BF1732BCAD3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "D41A798E-0D69-43C7-9A63-1E5921138EAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
                     matchCriteriaId: "1831D45A-EE6E-4220-8F8C-248B69520948",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "5A633996-2FD7-467C-BAA6-529E16BD06D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "253C303A-E577-4488-93E6-68A8DD942C38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                     matchCriteriaId: "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
                     matchCriteriaId: "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                     matchCriteriaId: "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E88A537F-F4D0-46B9-9E37-965233C2A355",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*",
                     matchCriteriaId: "92F31F7F-02E0-4E63-A600-DF8AB4E3BAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
                     matchCriteriaId: "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
                     matchCriteriaId: "4FD4237A-C257-4D8A-ABC4-9B2160530A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5A449C87-C5C3-48FE-9E46-64ED5DD5F193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
                     matchCriteriaId: "F4B6215F-76BF-473F-B325-0975B0EB101E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
                     matchCriteriaId: "A1C4A10C-49A3-4103-9E56-F881113BC5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
                     matchCriteriaId: "50E7FD07-A309-48EC-A520-C7F0FA35865C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F868948A-04D7-473B-971F-721302653633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
                     matchCriteriaId: "830A9EBA-88F1-4277-B98F-75AC52A60824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
                     matchCriteriaId: "BFA2ADAB-E486-4DBB-8B84-CC095D102278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
                     matchCriteriaId: "9ACD0C03-ACD9-4D47-B3EE-1D8753FF5A83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
                     matchCriteriaId: "0DD32D8A-7531-4691-B45D-9EACC69A23D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*",
                     matchCriteriaId: "76DFA52F-5B2E-47DA-9A8E-7D17A7413929",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d66:*:*:*:*:*:*",
                     matchCriteriaId: "4D363E73-ABC4-4E9F-9E7B-86087D3A3F9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d67:*:*:*:*:*:*",
                     matchCriteriaId: "A7502F95-BADC-432A-B7BE-8E9931FA1448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d70:*:*:*:*:*:*",
                     matchCriteriaId: "9451CD3F-BF4E-4BBC-AD00-660BE2B313C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d71:*:*:*:*:*:*",
                     matchCriteriaId: "C63E8B17-250D-4D74-9A1F-2F3577D9A071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d72:*:*:*:*:*:*",
                     matchCriteriaId: "801AB7D7-3407-4F8B-83C4-CC16076DB0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d73:*:*:*:*:*:*",
                     matchCriteriaId: "FA4104D4-3FA2-4936-ACBD-06B0BD0B9E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d76:*:*:*:*:*:*",
                     matchCriteriaId: "090BB276-C169-4A41-B03D-0EC40D20E8BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d77:*:*:*:*:*:*",
                     matchCriteriaId: "51732A2B-52E2-4356-8409-5CB6D79F23DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46-d10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6390879-1AB9-4B11-A8A8-6B914F52EB83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46-d76:-:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2BAF7-8D71-474C-9F72-FF5DABC69749",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*",
                     matchCriteriaId: "AC1FED64-8725-4978-9EBF-E3CD8EF338E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
                     matchCriteriaId: "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
                     matchCriteriaId: "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5FF83BD0-3B28-481E-8C8F-09ECDA493DA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6E296274-AFC1-4F56-A4B3-827C2E0BC9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
                     matchCriteriaId: "3C82799B-BD25-4359-9E3D-4D7CA7367525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
                     matchCriteriaId: "094485FF-960C-4533-A2AF-6C4D420D260D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F8BE3661-1DE5-4F57-9384-68C1B34F6812",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
                     matchCriteriaId: "B45E8A14-E7F4-41EB-9BFA-7A19E35D11FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
                     matchCriteriaId: "C6C694C6-C58C-4513-91E8-6CC22A2386E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d51:*:*:*:*:*:*",
                     matchCriteriaId: "64A0CCD4-91BA-440E-A14C-48E67D1F03A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
                     matchCriteriaId: "6B65EF51-ED97-4973-94C4-8F66C553F190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
                     matchCriteriaId: "9EE7C08A-2A4B-4A84-AD95-A890913E2EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*",
                     matchCriteriaId: "44C61900-680C-4C74-8B96-ACC93FE9465E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d66:*:*:*:*:*:*",
                     matchCriteriaId: "6A793CCD-397E-45DA-9349-D01C69AB96D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*",
                     matchCriteriaId: "B6C38637-ABE0-419A-A053-CBE076766551",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*",
                     matchCriteriaId: "1F87EF0D-E609-4D4A-B228-CEF05C753E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
                     matchCriteriaId: "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
                     matchCriteriaId: "856A5668-FA4F-44E9-A3F0-BE4979F631E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
                     matchCriteriaId: "F3B2DA4D-5E5D-4E09-BE4D-5B3371703D8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
                     matchCriteriaId: "FA2459ED-DFA5-4701-AF92-C2928C3BD64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
                     matchCriteriaId: "8830C4BC-2B3D-4CCF-A37E-79C2D46159BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
                     matchCriteriaId: "40D42ACF-860C-4B47-8E25-7DEC30FB8064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
                     matchCriteriaId: "C808E08F-1992-43DD-A106-E920DC784831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*",
                     matchCriteriaId: "C8C94365-988C-4A14-8E49-846152FDC666",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
                     matchCriteriaId: "E288F54B-AEA3-412F-85A4-EBDFE74DB84F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*",
                     matchCriteriaId: "02AAC05C-1C4B-4F35-A286-52D20DFD6212",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
                     matchCriteriaId: "080422D3-B508-4049-B558-4B04BF2E8AB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:*",
                     matchCriteriaId: "2FAFD8F8-CBD2-45CA-BD3C-875C8FA1D778",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
                     matchCriteriaId: "18468579-0195-4DDE-BAA5-4BE4068F3A69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6825F6BA-B48F-4E02-938F-6B297E21BA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
                     matchCriteriaId: "0E5FAA97-171F-4DB9-B78E-6E1A5F34336A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
                     matchCriteriaId: "870244F3-1C05-4F10-A205-5189BB860F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
                     matchCriteriaId: "235EE40B-AA15-4F39-8087-A051F4F70995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
                     matchCriteriaId: "17330544-3AFC-463E-A146-2840A8AE17D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA301F-7866-42A5-8391-E07BEAFF06FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
                     matchCriteriaId: "884E4A85-ED42-4391-9FDD-9052F957743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
                     matchCriteriaId: "1901864B-688B-4352-A587-4B96B4E49FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
                     matchCriteriaId: "78F53FBF-C6D8-4AE5-87EC-9D9F88DCEFB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
                     matchCriteriaId: "1B6670FB-9F5A-469B-97F2-074C28572065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
                     matchCriteriaId: "71198992-83AA-4E28-BA7D-A3C1897B5E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
                     matchCriteriaId: "4323D874-C317-4D76-8E2D-C82376D84CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
                     matchCriteriaId: "F56067DA-EBA9-481A-B60B-52148584EFBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "A283D32F-1CAF-4A5A-83E1-585F2801771F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "38A40E03-F915-4888-87B0-5950F75F097D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C52E355B-DA7D-4FDE-B2D7-A3C3C9C99918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "267A3603-BC18-442E-803A-4CAEB6493433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A2C7B980-033E-40AC-98C9-B252733B0F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BA8D32E4-1892-46DC-9782-5466A14E18D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "25C7C3D0-A203-4979-8375-A610ADD48E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
                     matchCriteriaId: "D1CAEBD2-2E46-44B5-B1D1-1DDBD450FD27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "565AE6D8-28A9-4A62-A886-5BAB954695D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C366F93-BB30-4144-99AE-40B676977834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "488BB10A-1360-42E5-A68D-23D51B332850",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "64988F0A-E02C-455B-99C9-4059C896416F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "DC2ACA85-FA89-40F0-A2AD-778E1CB02A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9F431D3D-5D55-45A9-98E8-00CB1D4C0196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DF3F9F86-166F-45E4-92B7-3DD3B06199F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "F0F65DCA-34B9-4CE8-91C9-426AAAEB4097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "341417EE-71C2-465C-96CA-65B2B5B63FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "A701A73D-A795-47DD-8EB5-55D1CDF67A49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*",
                     matchCriteriaId: "CC1EE8D6-8963-49D8-84C7-C9406B04D9EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s13:*:*:*:*:*:*",
                     matchCriteriaId: "03BCD35E-29D3-4F8C-ABE9-32C7010FD796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "4EC7D216-D8F3-4ABD-97C9-4C9FB6DF64FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5E327643-D8D8-4EFA-9F38-BA862A919501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "1BC6CE1C-9DD8-429E-BDC2-251D8C8674E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "63B00B4F-3E65-4CB2-807D-43908B570AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "0DFDD907-5305-4602-8A9C-685AA112C342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B0A756E2-C320-405A-B24F-7C5022649E5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6F4C1-6A7E-474F-89BC-7A3C50FD8CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84F5BCBA-404B-4BC9-B363-CE6D231B0D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18A4CA3E-DA61-49CC-8476-3A476CCB2B83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A7380B3E-09F5-4497-86C6-11EF56BD89F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "658841A9-BEC9-433E-81D0-47DE82887C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5AD05209-1274-4F8A-9FA2-A1A8DFCC5755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s13:*:*:*:*:*:*",
                     matchCriteriaId: "F144834D-7FC0-4B60-AFCB-AD86BA121719",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C97683B3-A07B-428F-9535-C49B55305679",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A14CE132-C56B-43D8-A248-AB6A2D1A7B6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "73978DD8-BD92-4872-8F35-AF2B9BCA1ECB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "678F57D1-2595-4AF3-BB87-AF2E1FE3CBB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7988CE92-71D2-4EEC-B596-4A60E2C1136A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "330D176F-8DAD-440C-A623-44FA233FAB01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "8CC5EAB8-1364-4325-9F01-BE7CC479C29D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "238EC996-8E8C-4332-916F-09E54E6EBB9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EEFCDA90-67E2-4AEF-800C-1D29A9121B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "74B99981-840F-4DAD-976A-5DAEFE9FB93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BDD3ADB9-35FF-41D3-92BD-98D6D4826B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "341F2459-8335-40E9-A2B3-BE804D319F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "0CD17956-8E8C-489D-927A-5709C05EA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "27D9AEBC-2CA3-4E17-9543-D60B10BA2AE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F68E75-E6C6-4DB4-AE0E-C5637ECE7C88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.",
      },
      {
         lang: "es",
         value: "named en ISC BIND 9.x en versiones anteriores a 9.9.8-P4 y 9.10.x en versiones anteriores a 9.10.3-P4 permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y salida de demonio) a través de un registro de firma manipulado para un registro DNAME, relacionada con db.c y resolver.c.",
      },
   ],
   id: "CVE-2016-1286",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-03-09T23:59:03.147",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3511",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1035237",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2925-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01353",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01380",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01438",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201610-07",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178880.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179904.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179911.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=146191105921542&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0562.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2016-0601.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2016/dsa-3511",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1035237",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2925-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01353",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01380",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/article/AA-01438",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:13.bind.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201610-07",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-18 03:15
Modified
2024-11-21 06:46
Summary
On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E46B49AE-2783-4962-9919-A0E1DDFCE4C9",
                     versionEndExcluding: "19.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "92292C23-DC38-42F1-97C1-8416BBB60FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "59E2311C-075A-4C64-B614-728A21B17B1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "8120EAC3-DCCB-4429-A372-C0DAA3270A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DF81F459-915E-468C-8E82-85F1A601095B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "9912E998-75FB-4EA0-8E36-0A1C38147AB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C7AE90D0-D502-4262-A83E-F40308A81380",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "ADCE4EA8-DDBA-4766-BB81-E4DA29723723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "2849078A-447A-4615-94E1-58AF450ED22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C2C625B6-25ED-4F6C-A778-6AB7FA7901CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*",
                     matchCriteriaId: "84EC3EE0-F1D9-4CBB-B3FA-83C05C50EB5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "920FE638-BDE6-403D-9083-2BDBF6A3326F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E38CD1E2-41F5-42D1-B915-055A497C576A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "0C816B9A-F152-4E5F-8152-73635840A89A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E0EA9DA-2DAD-4FA4-8CCC-E2F3D7069305",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "45DA4D89-1362-421F-8218-585CE5D60E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.",
      },
      {
         lang: "es",
         value: "En los dispositivos de la serie SRX, una comprobación inadecuada de condiciones inusuales o excepcionales cuando se utiliza la reinscripción automática del Protocolo de gestión de certificados versión 2 (CMPv2), permite que un atacante no autenticado basado en la red provoque una denegación de servicio (DoS) al bloquear el proceso pkid. El proceso pkid no puede manejar una respuesta inesperada del servidor de la Autoridad de Certificación (CA), lo que lleva a la caída. Se requiere un reinicio para restaurar los servicios. Este problema afecta a: Juniper Networks Junos OS en la serie SRX: Todas las versiones anteriores a la 19.1R3-S9; las versiones 19.2 anteriores a la 19.2R3-S6; las versiones 19.3 anteriores a la 19.3R3-S7; las versiones 19.4 anteriores a la 19.4R3-S9; las versiones 20.2 anteriores a la 20.2R3-S5; las versiones 20. 3 versiones anteriores a 20.3R3-S4; 20.4 versiones anteriores a 20.4R3-S4; 21.1 versiones anteriores a 21.1R3-S1; 21.2 versiones anteriores a 21.2R3; 21.3 versiones anteriores a 21.3R2; 21.4 versiones anteriores a 21.4R2",
      },
   ],
   id: "CVE-2022-22218",
   lastModified: "2024-11-21T06:46:25.130",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-18T03:15:09.497",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69901",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69901",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 15:15
Modified
2024-11-21 06:46
Summary
An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by "show security alg sip calls". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by \"show security alg sip calls\". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de liberación inapropiada de memoria antes de eliminar la última referencia en la puerta de enlace de la capa de aplicación (ALG) del protocolo de iniciación de sesiones (SIP) del Sistema Operativo Junos de Juniper Networks permite a un atacante no autenticado basado en la red causar una Denegación de Servicio (DoS) parcial. En todas las plataformas MX y SRX, si la ALG SIP está habilitada, la recepción de un paquete SIP específico creará una entrada SIP antigua. La recepción sostenida de tales paquetes causará que la tabla de llamadas SIP se llene eventualmente y cause un DoS para todo el tráfico SIP. El uso de llamadas SIP puede ser monitoreado por \"show security alg sip calls\". Para ser afectado el SIP ALG necesita ser habilitado, ya sea implícitamente / por defecto o por medio de la configuración. Por favor, verifique en el SRX con: user@host) show security alg status | match sip SIP : Enabled Por favor, verifique en MX si lo siguiente está configurado: [ services ... rule (rule-name) (term (term-name)) from/match application/application-set (name) ] donde a. name = junos-sip o una aplicación o application-set se refiere a SIP: b. [ applications application (name) application-protocol sip ] o c. [ applications application-set (name) application junos-sip ] Este problema afecta a Juniper Networks Junos OS en las series SRX y MX: versiones 20.4 anteriores a 20.4R3-S2; versiones 21.1 anteriores a 21.1R3-S2; versiones 21.2 anteriores a 21.2R2-S2; versiones 21.2 anteriores a 21.2R3; versiones 21.3 anteriores a 21.3R2; versiones 21.4 anteriores a 21.4R2. Este problema no afecta a versiones del Sistema Operativo Junos de Juniper Networks anteriores a 20.4R1. El SIRT de Juniper no presenta conocimiento de ninguna explotación maliciosa de esta vulnerabilidad",
      },
   ],
   id: "CVE-2022-22204",
   lastModified: "2024-11-21T06:46:23.170",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-20T15:15:08.393",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69708",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69708",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 23:15
Modified
2024-11-21 02:32
Summary
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.​ Note that the ftps-extensions option is not enabled by default.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:*",
                     matchCriteriaId: "86141A33-344E-4152-8B76-2DB383954F02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*",
                     matchCriteriaId: "AC405A12-112D-4C9D-90DA-6ED484109793",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*",
                     matchCriteriaId: "3FC42F2D-7593-4DBE-AE89-A6B78E7F9089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*",
                     matchCriteriaId: "731A6469-3DE0-491A-BCC5-7642FB347ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*",
                     matchCriteriaId: "D12A8119-3E59-4062-9A04-1F6EA48B78E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*",
                     matchCriteriaId: "E8B33B80-3189-4412-BFE0-359E755AB07A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d35:*:*:*:*:*:*",
                     matchCriteriaId: "C0E8F87E-DEB2-4849-ABB5-75A67CFD2D39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d40:*:*:*:*:*:*",
                     matchCriteriaId: "BDE231CE-0D93-4293-8720-4CCEE2EA651E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d45:*:*:*:*:*:*",
                     matchCriteriaId: "74253C79-C13F-4FBD-B173-8E87A62845DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x44:d50:*:*:*:*:*:*",
                     matchCriteriaId: "96831D1B-881B-4B18-A330-9E32A0D21148",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:-:*:*:*:*:*:*",
                     matchCriteriaId: "92F31F7F-02E0-4E63-A600-DF8AB4E3BAA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
                     matchCriteriaId: "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
                     matchCriteriaId: "4FD4237A-C257-4D8A-ABC4-9B2160530A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5A449C87-C5C3-48FE-9E46-64ED5DD5F193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
                     matchCriteriaId: "F4B6215F-76BF-473F-B325-0975B0EB101E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
                     matchCriteriaId: "A1C4A10C-49A3-4103-9E56-F881113BC5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
                     matchCriteriaId: "50E7FD07-A309-48EC-A520-C7F0FA35865C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46-d10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6390879-1AB9-4B11-A8A8-6B914F52EB83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x47:-:*:*:*:*:*:*",
                     matchCriteriaId: "ABBEDB3F-5FD1-4290-A80A-7EAD9B9C38C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x47:d10:*:*:*:*:*:*",
                     matchCriteriaId: "181C0D30-4476-48EE-A4A4-3B2461F4AC20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x47:d15:*:*:*:*:*:*",
                     matchCriteriaId: "63F559A2-2744-4771-9420-C70AA87496A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x47:d20:*:*:*:*:*:*",
                     matchCriteriaId: "040A6307-236E-4FAA-9A74-676F1DB0CF17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:-:*:*:*:*:*:*",
                     matchCriteriaId: "AC1FED64-8725-4978-9EBF-E3CD8EF338E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
                     matchCriteriaId: "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
                     matchCriteriaId: "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*",
                     matchCriteriaId: "27A6BF09-ABBF-4126-ADD6-B174937F8554",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.​ Note that the ftps-extensions option is not enabled by default.",
      },
      {
         lang: "es",
         value: "Background por lo regular en, el trafico FTP no cifrado, el ALG FTP puede inspeccionar el canal de control no cifrado y abrir sesiones relacionadas para el canal de datos FTP. Estas sesiones relacionadas (gates) son específicas para las IPs de origen y destino y los puertos del cliente y del servidor. La intención del diseño de la opción ftps-extensions (que está desactivada por defecto) es proporcionar una funcionalidad similar cuando el SRX asegura el cliente FTP/FTPS. Como el canal de control está cifrado, el ALG de FTP no puede inspeccionar la información específica del puerto y abrirá un canal de datos TCP más amplio (puerta) desde la IP del cliente a la IP del servidor en todos los puertos TCP de destino. En entornos de clientes FTP/FTPS a una red empresarial o a Internet, este es el comportamiento deseado, ya que permite escribir la política del cortafuegos a los servidores FTP/FTPS en puertos de control conocidos sin utilizar una política con IP de destino ANY y puerto de destino ANY. Problema La opción ftps-extensions no está pensada ni recomendada cuando el SRX protege el servidor FTPS, ya que la sesión de canal de datos amplio (puerta) permitirá al cliente FTPS acceder temporalmente a todos los puertos TCP del servidor FTPS. La sesión de datos está asociada al canal de control y se cerrará cuando se cierre la sesión del canal de control. Dependiendo de la configuración del servidor FTPS, del balanceador de carga que lo soporta y de los valores de tiempo de espera de inactividad del SRX, el servidor/balanceador de carga y el SRX pueden mantener el canal de control abierto durante un periodo de tiempo prolongado, permitiendo el acceso de un cliente FTPS durante un periodo igual. Nota la opción ftps-extensions no está habilitada por defecto",
      },
   ],
   id: "CVE-2015-5361",
   lastModified: "2024-11-21T02:32:52.517",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.5,
            source: "cve@mitre.org",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T23:15:11.103",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA10706",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA10706",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-326",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-12 01:15
Modified
2024-11-21 08:54
Summary
A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In a remote access VPN scenario, if a "tcp-encap-profile" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed. This issue affects Juniper Networks Junos OS on SRX Series: * All versions earlier than 20.4R3-S8; * 21.2 versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S3; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx1600 -
juniper srx210 -
juniper srx220 -
juniper srx2300 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4300 -
juniper srx4600 -
juniper srx4700 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "9D157211-535E-4B2D-B2FE-F697FAFDF65C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "06156CD6-09D3-4A05-9C5E-BC64A70640F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "20EBC676-1B26-4A71-8326-0F892124290A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "1379EF30-AF04-4F98-8328-52A631F24737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "\nA Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nIn a remote access VPN scenario, if a \"tcp-encap-profile\" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n  *  All versions earlier than 20.4R3-S8;\n  *  21.2 versions earlier than 21.2R3-S6;\n  *  21.3 versions earlier than 21.3R3-S5;\n  *  21.4 versions earlier than 21.4R3-S5;\n  *  22.1 versions earlier than 22.1R3-S3;\n  *  22.2 versions earlier than 22.2R3-S3;\n  *  22.3 versions earlier than 22.3R3-S1;\n  *  22.4 versions earlier than 22.4R2-S2, 22.4R3.\n\n\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad Double Free en el flow processing daemon (flowd) de Juniper Networks Junos OS en la serie SRX permite que un atacante no autenticado basado en red provoque una denegación de servicio (DoS). En un escenario de VPN de acceso remoto, si se configura un \"tcp-encap-profile\" y se recibe una secuencia de paquetes específicos, se observará una falla fluida y un reinicio. Este problema afecta a Juniper Networks Junos OS en la serie SRX: * Todas las versiones anteriores a 20.4R3-S8; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S3; * Versiones 22.3 anteriores a 22.3R3-S1; * Versiones 22.4 anteriores a 22.4R2-S2, 22.4R3.",
      },
   ],
   id: "CVE-2024-21606",
   lastModified: "2024-11-21T08:54:42.453",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-12T01:15:48.873",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA75747",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA75747",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-415",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-415",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-19 01:15
Modified
2024-11-21 06:46
Summary
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated networked attacker to cause a flowprocessing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can occur in a scenario where the SIP ALG is enabled and specific SIP messages are being processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated networked attacker to cause a flowprocessing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can occur in a scenario where the SIP ALG is enabled and specific SIP messages are being processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de bloqueo inapropiado en el SIP ALG de Juniper Networks Junos OS en las series MX y SRX permite a un atacante no autenticado en red causar un bloqueo del demonio de procesamiento de flujos (flowd) y, por tanto, una denegación de servicio (DoS). La recepción continuada de estos paquetes específicos causará una condición de denegación de servicio sostenida. Este problema puede producirse en un escenario en el que la SIP ALG esté habilitada y estén procesándose simultáneamente mensajes SIP específicos. Este problema afecta a: Juniper Networks Junos OS en las series MX y SRX versiones anteriores a 20.4R3-S1; versiones 21.1 anteriores a 21.1R2-S2, 21.1R3; versiones 21.2 anteriores a 21.2R1-S2, 21.2R2; versiones 21.3 anteriores a 21.3R1-S1, 21.3R2. Este problema no afecta a versiones del Sistema Operativo Junos de Juniper Networks anteriores a 20.4R1",
      },
   ],
   id: "CVE-2022-22175",
   lastModified: "2024-11-21T06:46:19.223",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-19T01:15:09.393",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11281",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11281",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-667",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-25 23:15
Modified
2024-11-21 08:54
Summary
A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to access sensitive system information. When a user logs in, a temporary file which contains the configuration of the device (as visible to that user) is created in the /cache folder. An unauthenticated attacker can then attempt to access such a file by sending a specific request to the device trying to guess the name of such a file. Successful exploitation will reveal configuration information. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R1-S2, 23.2R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.2
juniper ex_redundant_power_system -
juniper ex_rps -
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-24mp -
juniper ex2300-24p -
juniper ex2300-24t -
juniper ex2300-48mp -
juniper ex2300-48p -
juniper ex2300-48t -
juniper ex2300-c -
juniper ex2300_multigigabit -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4100 -
juniper ex4100-f -
juniper ex4100_multigigabit -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300_multigigabit -
juniper ex4300m -
juniper ex4400 -
juniper ex4400-24x -
juniper ex4400_multigigabit -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx1600 -
juniper srx210 -
juniper srx220 -
juniper srx2300 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4300 -
juniper srx4600 -
juniper srx4700 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "C445622E-8E57-4990-A71A-E1993BFCB91A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C470FB4E-A927-4AF3-ACB0-AD1E264218B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "9D157211-535E-4B2D-B2FE-F697FAFDF65C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EFF72FCA-C440-4D43-9BDB-F712DB413717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "DE69E9E3-00FC-41BF-9109-617668CF9A0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "06156CD6-09D3-4A05-9C5E-BC64A70640F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "20EBC676-1B26-4A71-8326-0F892124290A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "1379EF30-AF04-4F98-8328-52A631F24737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "EBB967BF-3495-476D-839A-9DBFCBE69F91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "1A78CC80-E8B1-4CDA-BB35-A61833657FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F1B16FF0-900F-4AEE-B670-A537139F6909",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex_redundant_power_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFE03C4A-3FA7-43FC-8801-4F1566B54388",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex_rps:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42877394-A0A1-4136-A1D3-D287BFCC85E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3A0D9C0-34D3-430F-ABFA-B68010A8825D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E04B126-F290-4242-BB80-5F573D623E6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "671D9977-7657-48C7-A07C-4AED54380A86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E100C3C-070D-4132-927F-756538B91491",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2032E7DD-96FD-48B7-922C-5FE04675796C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D907D6A-B7C4-4A10-AA58-0F908575A435",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "332F4692-7E33-4FB6-9DE2-09E0A0068DB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2521C83-E8F2-4621-9727-75BB3FC11E64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F496D19-D28C-4517-90A3-90EC62BC5D79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4100_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC6E4532-5DD9-45D4-996A-37C7E5742856",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B410BA4-181A-4241-A95E-2238CE1627A3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400-24x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EEC1C95-E6B2-4364-88AD-C69EC00353FE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400_multigigabit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D77FA1A-4B09-4184-A03E-AE4831C9BBAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to access sensitive system information.\n\nWhen a user logs in, a temporary file which contains the configuration of the device (as visible to that user) is created in the /cache folder. An unauthenticated attacker can then attempt to access such a file by sending a specific request to the device trying to guess the name of such a file. Successful exploitation will reveal configuration information.\n\nThis issue affects Juniper Networks Junos OS on SRX Series and EX Series:\n  *  All versions earlier than 20.4R3-S9;\n  *  21.2 versions earlier than 21.2R3-S7;\n  *  21.3 versions earlier than 21.3R3-S5;\n  *  21.4 versions earlier than 21.4R3-S6;\n  *  22.1 versions earlier than 22.1R3-S5;\n  *  22.2 versions earlier than 22.2R3-S3;\n  *  22.3 versions earlier than 22.3R3-S2;\n  *  22.4 versions earlier than 22.4R3;\n  *  23.2 versions earlier than 23.2R1-S2, 23.2R2.\n\n\n",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de autenticación faltante para función crítica combinada con una vulnerabilidad de generación de mensaje de error que contiene información confidencial en J-Web de Juniper Networks Junos OS en las series SRX y EX permite que un atacante basado en red no autenticado acceda a información confidencial del sistema. Cuando un usuario inicia sesión, se crea un archivo temporal que contiene la configuración del dispositivo (como es visible para ese usuario) en la carpeta /cache. Un atacante no autenticado puede intentar acceder a dicho archivo enviando una solicitud específica al dispositivo para intentar adivinar el nombre de dicho archivo. La explotación exitosa revelará información de configuración. Este problema afecta a Juniper Networks Junos OS en las series SRX y EX: * Todas las versiones anteriores a 20.4R3-S9; * Versiones 21.2 anteriores a 21.2R3-S7; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S6; * Versiones 22.1 anteriores a 22.1R3-S5; * Versiones 22.2 anteriores a 22.2R3-S3; * Versiones 22.3 anteriores a 22.3R3-S2; * Versiones 22.4 anteriores a 22.4R3; * Versiones 23.2 anteriores a 23.2R1-S2, 23.2R2.",
      },
   ],
   id: "CVE-2024-21619",
   lastModified: "2024-11-21T08:54:44.270",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-25T23:15:09.467",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA76390",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA76390",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-209",
            },
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-209",
            },
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-14 17:15
Modified
2024-11-21 07:56
Summary
An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition. On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core. This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598. In order to identify the current SigPack version, following command can be used: user@junos# show security idp security-package-version



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "432CAEBA-3386-4FC5-8416-4277114500F1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F68E75-E6C6-4DB4-AE0E-C5637ECE7C88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.\n\nOn all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.\n\nThis issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.\n\nIn order to identify the current SigPack version, following command can be used:\n\nuser@junos# show security idp security-package-version",
      },
   ],
   id: "CVE-2023-28985",
   lastModified: "2024-11-21T07:56:20.603",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-14T17:15:09.050",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA71662",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA71662",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1286",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is enabled. Successful exploitation of this vulnerability prevents additional SIP calls and applications from succeeding. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.1 versions 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1. This issue does not affect Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 18.2R1.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECFE39BF-15FB-4129-9D8C-4F28DABB5D83",
                     versionEndExcluding: "19.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "45DA4D89-1362-421F-8218-585CE5D60E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DC8E7547-6649-436D-BC45-184417680C72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D9789FF8-D55C-4AF9-A250-E543A0EB826F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "5C238EB1-5A38-4877-8849-4A6D36918B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D621DB7F-BC6B-4A07-8803-596B3ED11CF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A5620596-4DEE-41D7-A63F-224D814DAA77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A8BBCEC0-5915-4F69-90FD-070A94145BB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D3C93B13-DCEB-4861-87DC-3F1ECBAF7FFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E5E3FDB-3F33-4686-9B64-0152AD41939D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "7B798133-105C-448B-B06E-57327E44E478",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "5C1C3B09-3800-493E-A319-57648305FE6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is enabled. Successful exploitation of this vulnerability prevents additional SIP calls and applications from succeeding. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.1 versions 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1. This issue does not affect Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 18.2R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de manejo inadecuado de tipos de datos inesperados en el manejo de llamadas SIP en Juniper Networks Junos OS en plataformas de las series SRX y MX permite a un atacante causar una pérdida de memoria que conduce a una denegación de servicios (DoS). Este problema ocurre en todas las plataformas de la serie MX con tarjeta MS-MPC o MS-MIC y en todas las plataformas de la serie SRX donde SIP ALG está habilitado. La explotación exitosa de esta vulnerabilidad evita que se realicen correctamente llamadas y aplicaciones SIP adicionales. El SIP ALG debe estar habilitado, ya sea de forma implícita/por defecto o mediante configuración. Para confirmar si SIP ALG está habilitado en SRX, utilice el siguiente comando: usuario@host&gt; mostrar el estado de las variables de seguridad | match sip SIP: habilitado Este problema afecta a Juniper Networks Junos OS en las series SRX y MX: todas las versiones anteriores a 19.3R3-S7; Versiones 19.4 anteriores a 19.4R2-S8, 19.4R3-S10; 20.1 versiones 20.1R1 y versiones posteriores; Versiones 20.2 anteriores a 20.2R3-S6; Versiones 20.3 anteriores a 20.3R3-S6; Versiones 20.4 anteriores a 20.4R3-S5; Versiones 21.1 anteriores a 21.1R3-S5; Versiones 21.2 anteriores a 21.2R3-S1; Versiones 21.3 anteriores a 21.3R3; Versiones 21.4 anteriores a 21.4R2-S2, 21.4R3; Versiones 22.1 anteriores a 22.1R1-S2, 22.1R2, 22.1R3-S1. Este problema no afecta a Juniper Networks Junos OS en las series SRX y MX: todas las versiones anteriores a 18.2R1.",
      },
   ],
   id: "CVE-2023-22394",
   lastModified: "2024-11-21T07:44:43.493",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:10.030",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70190",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70190",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-911",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-01-15 18:15
Modified
2024-11-21 05:42
Severity ?
Summary
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.
Impacted products
Vendor Product Version
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.1
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.2
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.1
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos_os_evolved 19.2
juniper junos_os_evolved 19.2
juniper junos_os_evolved 19.3
juniper junos_os_evolved 19.4
juniper junos_os_evolved 19.4
juniper junos_os_evolved 19.4
juniper junos_os_evolved 20.1
juniper junos_os_evolved 20.1
juniper junos_os_evolved 20.2
juniper junos_os_evolved 20.3
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49-d30
juniper junos 15.1x49-d60
juniper junos 15.1x49-d140
juniper junos 15.1x49-d150
juniper junos 15.1x49-d160
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper ex_rps -
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-c -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300m -
juniper ex4400 -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "A283D32F-1CAF-4A5A-83E1-585F2801771F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C52E355B-DA7D-4FDE-B2D7-A3C3C9C99918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "69FC46D4-39E2-4E2F-A1D3-1001769A7115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "32F83E8B-A816-4F26-95F8-F0DA7F3DF426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2C433359-BC8B-4E69-BE74-A31EB148083A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2976C-C84B-40D9-A806-588629BFFB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A2C7B980-033E-40AC-98C9-B252733B0F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BA8D32E4-1892-46DC-9782-5466A14E18D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
                     matchCriteriaId: "D1CAEBD2-2E46-44B5-B1D1-1DDBD450FD27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "565AE6D8-28A9-4A62-A886-5BAB954695D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C366F93-BB30-4144-99AE-40B676977834",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "488BB10A-1360-42E5-A68D-23D51B332850",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "64988F0A-E02C-455B-99C9-4059C896416F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "C9C703CA-9309-413A-9CD7-585277ADD32D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "130E4A30-A19D-4D1E-B91C-575E8F43EA87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "E3AC83F1-2BCF-4159-9719-EB15ADD7663B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "A00CA6FB-8F28-4171-B510-8DBA351E80C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "988D317A-0646-491F-9B97-853E8E208276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "605F1AD7-5B09-44F0-9017-15AB3EEE559C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "CEDDCD30-2255-4FA9-B3E2-9E88AB6F8D80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "4E4EB6B0-8DB2-4199-96E4-30195D49F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "204FC7B5-9CF2-4AC2-9B8D-DA48CAEA6496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9D8A8E33-473A-4A40-A7B7-47086BB9012A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "F0F65DCA-34B9-4CE8-91C9-426AAAEB4097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E0CE79A-157D-47DE-BE65-936BC12470EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "05060C06-18C1-40E8-AE01-385B036CC9AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
                     matchCriteriaId: "341417EE-71C2-465C-96CA-65B2B5B63FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
                     matchCriteriaId: "A701A73D-A795-47DD-8EB5-55D1CDF67A49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C752783-4843-407B-AF33-0E1D36FCAAF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "006EE425-A146-4E10-B050-7E754BB8402A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "2B482BCC-1F0C-47AA-B63B-1B39CEF7B2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "A636F9F2-2DA7-4A27-AD80-FD1B34DFCA94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "4EC7D216-D8F3-4ABD-97C9-4C9FB6DF64FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "5E327643-D8D8-4EFA-9F38-BA862A919501",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "1BC6CE1C-9DD8-429E-BDC2-251D8C8674E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
                     matchCriteriaId: "63B00B4F-3E65-4CB2-807D-43908B570AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "8732E25A-9073-4C7B-9E89-C02368728EB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09255363-BF79-4FC3-AADD-5FAD0902174F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "11A24AA6-5378-4EEA-82D5-66A5F1110698",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "64CF2868-993A-48C8-8FBA-892507BBBF21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "0DFDD907-5305-4602-8A9C-685AA112C342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B0A756E2-C320-405A-B24F-7C5022649E5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2EF6F4C1-6A7E-474F-89BC-7A3C50FD8CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "84F5BCBA-404B-4BC9-B363-CE6D231B0D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18A4CA3E-DA61-49CC-8476-3A476CCB2B83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A7380B3E-09F5-4497-86C6-11EF56BD89F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "658841A9-BEC9-433E-81D0-47DE82887C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5AD05209-1274-4F8A-9FA2-A1A8DFCC5755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
                     matchCriteriaId: "68EBE6E9-5E3B-44A1-992F-D6B656706268",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
                     matchCriteriaId: "2433F883-8545-421E-9CB7-AF36A578E930",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C97683B3-A07B-428F-9535-C49B55305679",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A14CE132-C56B-43D8-A248-AB6A2D1A7B6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "73978DD8-BD92-4872-8F35-AF2B9BCA1ECB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7988CE92-71D2-4EEC-B596-4A60E2C1136A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "330D176F-8DAD-440C-A623-44FA233FAB01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "8CC5EAB8-1364-4325-9F01-BE7CC479C29D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
                     matchCriteriaId: "4E2E933A-852F-4257-860D-09638EE0D2F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
                     matchCriteriaId: "90BF177D-A895-4D05-B674-B27420A5DC6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "238EC996-8E8C-4332-916F-09E54E6EBB9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EEFCDA90-67E2-4AEF-800C-1D29A9121B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "74B99981-840F-4DAD-976A-5DAEFE9FB93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BDD3ADB9-35FF-41D3-92BD-98D6D4826B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "341F2459-8335-40E9-A2B3-BE804D319F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "0CD17956-8E8C-489D-927A-5709C05EA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "B7A3FBD3-5399-42A9-9BD9-E3C981CBD6DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD361C-8B4D-43EF-8B82-9FE165D8206E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6E7539C4-6208-43EB-9A0B-4852D0CE0FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "35299B02-DC75-458D-B86D-8A0DB95B06AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC3EF2-3339-4E3C-9C6D-E854EBBDEF9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CFB29C9B-9729-43EB-AF98-AF44038DA711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "2D1FB957-54C8-428E-BC8D-2802D7F6895F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A0BC4766-4BA4-4B02-A654-5C527EA66E9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "BB8263A9-5D63-46A2-9C98-B3980910B612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "736B7A9F-E237-45AF-A6D6-84412475F481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "62E63730-F697-4FE6-936B-FD9B4F22EAE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "064A7052-4EF5-4BFB-88FF-8122AEECB6A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "08C58CCB-3BAA-4400-B371-556DF46DE69C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "28F7740D-C636-4FA3-8479-E5E039041DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "C8CF858F-84BB-4AEA-B829-FCF22C326160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "5405F361-AB96-4477-AA0D-49B874324B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E45E5421-2F6F-4AF9-8EB1-431A804FC649",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "93098975-4A06-4A72-8DF0-F2C5E1AF2F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9A5B337A-727C-4767-AD7B-E0F7F99EB46F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "16FDE60B-7A99-4683-BC14-530B5B005F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "725D8C27-E4F8-4394-B4EC-B49B6D3C2709",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8233C3AB-470E-4D13-9BFD-C9E90918FD0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "512FB3D1-BA5B-4F73-BDB2-49D6889F5473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "8328FDE6-9707-4142-B905-3B07C0E28E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41CD982F-E6F2-4951-9F96-A76C142DF08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "914D6984-1820-483B-AEB9-2C5257B5E900",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:19.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "14C57D33-01BB-4190-B787-F5BDACE82AFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2D3C2D74-AF22-4BED-A0C5-089B5507D275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "83447F3F-79A3-41DF-8FD1-31DCFCBE40A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2B14CED1-BEAF-4343-A05D-FB1E2B6AC955",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "ABB91C38-8C70-436A-83DB-42B8DF81D7D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:20.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "AED25FB6-E3FA-4543-90B2-50068D683D50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "F64FBB4B-7CBF-499B-A523-804857DEFAFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "487A82C9-7B7E-4ACA-BABF-65B8504079AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4AFB91E3-CAAC-429F-A869-DDD40FB0F84D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*",
                     matchCriteriaId: "27A6BF09-ABBF-4126-ADD6-B174937F8554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
                     matchCriteriaId: "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
                     matchCriteriaId: "856A5668-FA4F-44E9-A3F0-BE4979F631E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
                     matchCriteriaId: "F3B2DA4D-5E5D-4E09-BE4D-5B3371703D8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
                     matchCriteriaId: "FA2459ED-DFA5-4701-AF92-C2928C3BD64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
                     matchCriteriaId: "8830C4BC-2B3D-4CCF-A37E-79C2D46159BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*",
                     matchCriteriaId: "40D42ACF-860C-4B47-8E25-7DEC30FB8064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
                     matchCriteriaId: "C808E08F-1992-43DD-A106-E920DC784831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:*",
                     matchCriteriaId: "C8C94365-988C-4A14-8E49-846152FDC666",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
                     matchCriteriaId: "E288F54B-AEA3-412F-85A4-EBDFE74DB84F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*",
                     matchCriteriaId: "02AAC05C-1C4B-4F35-A286-52D20DFD6212",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
                     matchCriteriaId: "080422D3-B508-4049-B558-4B04BF2E8AB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:*",
                     matchCriteriaId: "2FAFD8F8-CBD2-45CA-BD3C-875C8FA1D778",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d190:*:*:*:*:*:*",
                     matchCriteriaId: "C68F093D-3205-43A5-BA06-85AC7BEEFD94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
                     matchCriteriaId: "18468579-0195-4DDE-BAA5-4BE4068F3A69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d200:*:*:*:*:*:*",
                     matchCriteriaId: "A70F0055-74B8-41F3-BB43-6CBF3F231674",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d210:*:*:*:*:*:*",
                     matchCriteriaId: "8B7D617C-E88E-4981-91E1-0FAB5029E4B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6825F6BA-B48F-4E02-938F-6B297E21BA07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
                     matchCriteriaId: "0E5FAA97-171F-4DB9-B78E-6E1A5F34336A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
                     matchCriteriaId: "870244F3-1C05-4F10-A205-5189BB860F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
                     matchCriteriaId: "235EE40B-AA15-4F39-8087-A051F4F70995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
                     matchCriteriaId: "17330544-3AFC-463E-A146-2840A8AE17D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA301F-7866-42A5-8391-E07BEAFF06FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
                     matchCriteriaId: "884E4A85-ED42-4391-9FDD-9052F957743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
                     matchCriteriaId: "1901864B-688B-4352-A587-4B96B4E49FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
                     matchCriteriaId: "78F53FBF-C6D8-4AE5-87EC-9D9F88DCEFB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
                     matchCriteriaId: "1B6670FB-9F5A-469B-97F2-074C28572065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
                     matchCriteriaId: "71198992-83AA-4E28-BA7D-A3C1897B5E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
                     matchCriteriaId: "4323D874-C317-4D76-8E2D-C82376D84CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
                     matchCriteriaId: "F56067DA-EBA9-481A-B60B-52148584EFBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49-d30:*:*:*:*:*:*:*",
                     matchCriteriaId: "29805EC7-F643-40B7-B34F-3926151B0DFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49-d60:*:*:*:*:*:*:*",
                     matchCriteriaId: "C751DBA2-5E15-4953-A19A-BA320BC0D557",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49-d140:*:*:*:*:*:*:*",
                     matchCriteriaId: "2302E8E5-E659-45E0-9819-249064124C14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49-d150:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACA1D9AB-E5C7-41AB-9F00-860B871B34BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49-d160:*:*:*:*:*:*:*",
                     matchCriteriaId: "63E9B877-18EA-4CAB-8A01-58E09CC60DE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "285CD1E5-C6D3-470A-8556-653AFF74D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
                     matchCriteriaId: "83AB8877-3DC0-4B8C-B864-1BF18C368337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
                     matchCriteriaId: "D80CABB3-9A32-4FBC-AB8E-435BA85CFA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
                     matchCriteriaId: "C56F5C48-BA48-4EE1-88BE-782B3CFB3B90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
                     matchCriteriaId: "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AC196685-3B0C-4754-AE6A-6BE456CC6B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "F0146AA9-C513-4871-A62A-52C9F40EB958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A18672EF-E33D-4ACE-BB0A-561812F502C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CEF0E75F-831E-40B8-926D-B2E92A84E31B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
                     matchCriteriaId: "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
                     matchCriteriaId: "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
                     matchCriteriaId: "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
                     matchCriteriaId: "BFF0C559-EC2F-4FEE-B012-E9127A68FD4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
                     matchCriteriaId: "71D211B9-B2FE-4324-AAEE-8825D5238E48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "ABD3A11C-4CAA-4DDB-AD20-6C7EFA368CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
                     matchCriteriaId: "4D9134BF-7289-4503-A9C5-977C4CDCD108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
                     matchCriteriaId: "2698D906-6D9D-429C-9ECC-46FF2334C637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6126279A-8509-4CA1-BFB3-E76F701F5031",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "CA0D028E-0B07-4CB2-863A-527806B9917C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "846582E4-05A0-4AD9-B78B-1707A09DAA74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E43A39D8-3BD4-41CD-A8A3-2BFF8D340BCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "DECD665D-2CA4-4CB2-B77D-9230B102B339",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
                     matchCriteriaId: "85B83ED7-EE50-4F06-A386-B0A4FC7263DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
                     matchCriteriaId: "64F1FD18-AAD2-48DD-8F23-55D65D34FCE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
                     matchCriteriaId: "B02FED8D-A554-4039-9F0A-C7EEFC640317",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
                     matchCriteriaId: "BD332D86-5DA7-49A4-98C3-E4D946832DC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
                     matchCriteriaId: "6BFFAC38-5D41-4BDB-B9D4-579F104A61BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C7620D01-1A6B-490F-857E-0D803E0AEE56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
                     matchCriteriaId: "4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
                     matchCriteriaId: "03B09A78-9DEA-43A7-8DD6-56D94869DAEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
                     matchCriteriaId: "18B1A6D6-EB40-461A-87B0-FD777019E1BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
                     matchCriteriaId: "F8CD62D3-0894-426E-80A8-CEBCBD49810F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
                     matchCriteriaId: "08FC0245-A4FF-42C0-A236-8569301E351A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
                     matchCriteriaId: "A68E7711-C7B9-4578-AB7B-863F088A38BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
                     matchCriteriaId: "E0501706-CB27-42B6-916B-B0009EC333C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
                     matchCriteriaId: "41E43503-A694-406E-B95A-689E4167A4FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A464B371-1B8B-4563-8728-969825896115",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
                     matchCriteriaId: "120EA9E3-788B-4CFD-A74F-17111FFD0131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
                     matchCriteriaId: "6B4C2FBB-FEA0-4B98-8568-705FFFFFBB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
                     matchCriteriaId: "B2506FCC-4B0F-4FEF-A44E-0C704B6217F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
                     matchCriteriaId: "9D9F2F31-B378-40FE-B012-000A225B76F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
                     matchCriteriaId: "D014FF7B-BBEA-4F80-BE0E-4C70E4585A1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
                     matchCriteriaId: "C8257676-7AA7-4B39-A8F8-685843D0685B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
                     matchCriteriaId: "31001EA8-2C65-4D3D-AEC7-F298692E8752",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
                     matchCriteriaId: "33A3ECF9-AA4D-41F9-8441-1EB5F1DB882E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s10:*:*:*:*:*:*",
                     matchCriteriaId: "17C66198-8D9A-454C-B645-A040A5C1E12E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s11:*:*:*:*:*:*",
                     matchCriteriaId: "E0309A32-5087-4918-B1EE-10EC28F50B2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
                     matchCriteriaId: "989D1170-C430-4117-8E3B-46D8B459DF49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
                     matchCriteriaId: "DB2FD851-BBB6-4D29-B933-1070564E0B50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
                     matchCriteriaId: "5229750A-8555-4A4F-AD6C-82400BE81E1C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C5646AB3-407E-4745-8B16-4B58A8961D81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
                     matchCriteriaId: "D61247C5-C611-47CE-89BA-AB3958A975B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
                     matchCriteriaId: "CA9DB8A3-2E5F-4969-9D42-25363489A133",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex_rps:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42877394-A0A1-4136-A1D3-D287BFCC85E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.",
      },
      {
         lang: "es",
         value: "Una comprobación inapropiada de condiciones inusuales o excepcionales en Juniper Networks. El servicio Routing Protocol Daemon (RPD) de Junos OS y Junos OS Evolved permite a un atacante enviar un mensaje BGP FlowSpec válido, causando un cambio inesperado en los anuncios de ruta dentro del dominio BGP FlowSpec que conlleva a interrupciones en el tráfico de la red que causan una condición de Denegación de Servicio (DoS).&#xa0;La recepción continua de estos mensajes de actualización causará una condición sostenida de Denegación de Servicio.&#xa0;Este problema afecta a Juniper Networks: Junos OS: todas las versiones anteriores a 17.3R3-S10 con las excepciones de 15.1X49-D240 en la serie SRX y 15.1R7-S8 en la Serie EX;&#xa0;versiones 17.3  anteriores a 17.3R3-S10;&#xa0;versiones 17.4 anteriores a 17.4R2-S12, 17.4R3-S4; versiones&#xa0;18.1 anteriores a 18.1R3-S12;&#xa0;versiones 18.2 anteriores a 18.2R2-S8, 18.2R3-S6; versiones 18.3 anteriores a 18.3R3-S4;&#xa0;versiones 18.4 anteriores a 18.&#xa0;4R1-S8, 18.4R2-S6, 18.4R3-S6;&#xa0;versiones 19.1 anteriores a 19.1R1-S6, 19.1R2-S2, 19.1R3-S3;&#xa0;versiones 19.2 anteriores a 19.2R3-S1;&#xa0;versiones 19.3 anteriores a 19.3R2-S5, 19.3R3-S1;&#xa0;versiones 19.4 anteriores a 19.4R1-S3, 19.4R2-S3, 19.4R3;&#xa0;versiones 20.1 anteriores a 20.1R2;&#xa0;versiones 20.2 anteriores a 20.2R1-S3 20.2R2;&#xa0;versiones 20.3 anteriores a 20.3R1-S1, 20.3R2.&#xa0;Junos OS Evolved: todas las versiones anteriores a 20.3R1-S1-EVO, 20.3R2-EVO",
      },
   ],
   id: "CVE-2021-0211",
   lastModified: "2024-11-21T05:42:12.897",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.8,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
      ],
   },
   published: "2021-01-15T18:15:15.167",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11101",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11101",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-754",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-10-10 18:29
Modified
2024-11-21 03:37
Summary
Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Protocol Independent Multicast (PIM) protocol within the VPN. This issue can only be exploited from the PE device within the MPLS domain which is capable of forwarding IP multicast traffic in core. End-users connected to the CE device cannot cause this crash. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.1 versions prior to 18.1R2. No other Juniper Networks products or platforms are affected by this issue.
Impacted products
Vendor Product Version
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper junos 12.1x46
juniper srx100 -
juniper srx110 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx345 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx550m -
juniper srx650 -
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper junos 12.3x48
juniper srx100 -
juniper srx110 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx345 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx550m -
juniper srx650 -
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper junos 15.1x49
juniper srx100 -
juniper srx110 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx345 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx550m -
juniper srx650 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper ex2300 -
juniper ex3400 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper qfx10000 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper qfx5110 -
juniper qfx5200 -
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper junos 15.1x53
juniper nfx150 -
juniper nfx250 -
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.1
juniper junos 16.2
juniper junos 16.2
juniper junos 17.1
juniper junos 17.2
juniper junos 17.2
juniper junos 17.2
juniper junos 17.3
juniper junos 17.3
juniper junos 17.4
juniper junos 18.1
juniper junos 18.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFB89F64-16BB-4A14-9084-B338668D7FF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
                     matchCriteriaId: "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
                     matchCriteriaId: "4FD4237A-C257-4D8A-ABC4-9B2160530A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
                     matchCriteriaId: "5A449C87-C5C3-48FE-9E46-64ED5DD5F193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
                     matchCriteriaId: "F4B6215F-76BF-473F-B325-0975B0EB101E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
                     matchCriteriaId: "A1C4A10C-49A3-4103-9E56-F881113BC5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
                     matchCriteriaId: "50E7FD07-A309-48EC-A520-C7F0FA35865C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F868948A-04D7-473B-971F-721302653633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
                     matchCriteriaId: "830A9EBA-88F1-4277-B98F-75AC52A60824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
                     matchCriteriaId: "BFA2ADAB-E486-4DBB-8B84-CC095D102278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
                     matchCriteriaId: "9ACD0C03-ACD9-4D47-B3EE-1D8753FF5A83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
                     matchCriteriaId: "0DD32D8A-7531-4691-B45D-9EACC69A23D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E014A0D-0054-4EBA-BA1F-035B74BD822F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "371A7DF8-3F4B-439D-8990-D1BC6F0C25C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
                     matchCriteriaId: "F0DD051A-E486-4A9D-A978-A5A980AAF237",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C6F309FD-0A5A-4C86-B227-B2B511A5CEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*",
                     matchCriteriaId: "960059B5-0701-4B75-AB51-0A430247D9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*",
                     matchCriteriaId: "1D1DCA52-DA81-495B-B516-5571F01E3B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*",
                     matchCriteriaId: "05E187F6-BACD-4DD5-B393-B2FE4349053A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*",
                     matchCriteriaId: "3C240840-A6BC-4E3D-A60D-22F08E67E2B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*",
                     matchCriteriaId: "CC90563F-6BCB-4D77-8FD4-584E3A6C7741",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*",
                     matchCriteriaId: "5AD03BA7-D9EC-420F-97C4-383F79D6873F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*",
                     matchCriteriaId: "7192552C-7D4A-4D95-BA79-CDF465E27D37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
                     matchCriteriaId: "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
                     matchCriteriaId: "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
                     matchCriteriaId: "6E296274-AFC1-4F56-A4B3-827C2E0BC9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
                     matchCriteriaId: "3C82799B-BD25-4359-9E3D-4D7CA7367525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
                     matchCriteriaId: "094485FF-960C-4533-A2AF-6C4D420D260D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
                     matchCriteriaId: "F8BE3661-1DE5-4F57-9384-68C1B34F6812",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
                     matchCriteriaId: "B45E8A14-E7F4-41EB-9BFA-7A19E35D11FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
                     matchCriteriaId: "C6C694C6-C58C-4513-91E8-6CC22A2386E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*",
                     matchCriteriaId: "6B65EF51-ED97-4973-94C4-8F66C553F190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*",
                     matchCriteriaId: "9EE7C08A-2A4B-4A84-AD95-A890913E2EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*",
                     matchCriteriaId: "44C61900-680C-4C74-8B96-ACC93FE9465E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD0952C4-FFCC-4A78-ADFC-289BD6E269DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
                     matchCriteriaId: "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
                     matchCriteriaId: "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
                     matchCriteriaId: "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "C7620D01-1A6B-490F-857E-0D803E0AEE56",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
                     matchCriteriaId: "71D211B9-B2FE-4324-AAEE-8825D5238E48",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*",
                     matchCriteriaId: "20DABA6A-FA7A-4289-8C6A-2B93689A5440",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
                     matchCriteriaId: "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*",
                     matchCriteriaId: "856A5668-FA4F-44E9-A3F0-BE4979F631E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
                     matchCriteriaId: "F3B2DA4D-5E5D-4E09-BE4D-5B3371703D8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*",
                     matchCriteriaId: "FA2459ED-DFA5-4701-AF92-C2928C3BD64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*",
                     matchCriteriaId: "8830C4BC-2B3D-4CCF-A37E-79C2D46159BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
                     matchCriteriaId: "18468579-0195-4DDE-BAA5-4BE4068F3A69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
                     matchCriteriaId: "0E5FAA97-171F-4DB9-B78E-6E1A5F34336A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
                     matchCriteriaId: "870244F3-1C05-4F10-A205-5189BB860F46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
                     matchCriteriaId: "235EE40B-AA15-4F39-8087-A051F4F70995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
                     matchCriteriaId: "17330544-3AFC-463E-A146-2840A8AE17D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA301F-7866-42A5-8391-E07BEAFF06FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
                     matchCriteriaId: "884E4A85-ED42-4391-9FDD-9052F957743A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
                     matchCriteriaId: "1901864B-688B-4352-A587-4B96B4E49FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
                     matchCriteriaId: "78F53FBF-C6D8-4AE5-87EC-9D9F88DCEFB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
                     matchCriteriaId: "1B6670FB-9F5A-469B-97F2-074C28572065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
                     matchCriteriaId: "71198992-83AA-4E28-BA7D-A3C1897B5E2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
                     matchCriteriaId: "4323D874-C317-4D76-8E2D-C82376D84CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
                     matchCriteriaId: "F56067DA-EBA9-481A-B60B-52148584EFBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71FB14A-67D4-4EDD-BB32-07764F5AFA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
                     matchCriteriaId: "1E3B807C-196D-42B8-9042-7582A1366772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
                     matchCriteriaId: "83FEEE8F-9279-46F2-BAF9-A60537020C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
                     matchCriteriaId: "1DD0B95A-7C9F-4A18-9CD8-BA344DEFC9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
                     matchCriteriaId: "1F294E43-73FA-4EF3-90F2-EE29C56D6573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
                     matchCriteriaId: "EDDE1048-BFEA-4A3E-8270-27C538A68837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
                     matchCriteriaId: "CC517CD0-FF35-498F-AD33-683B43CA3829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
                     matchCriteriaId: "53F7E1C5-BFA9-426C-9F95-3EA5DB458C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
                     matchCriteriaId: "C2B5ED13-F998-447C-8FEA-047FE9FE2F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
                     matchCriteriaId: "65F3CD2A-D5E1-4EFF-9013-6D81B396F765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:*",
                     matchCriteriaId: "D58997E6-96B4-4930-A29D-B49D06DFA9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:*",
                     matchCriteriaId: "AFB887FD-D3FB-439F-9A89-CC367A74DB00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:*",
                     matchCriteriaId: "BDA46912-D173-49C5-A0A1-64BD0889D3A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:*",
                     matchCriteriaId: "3BEE4EE4-18D9-4FA9-9A02-917240B851AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:*",
                     matchCriteriaId: "188FED65-8A81-4BB0-B10B-8CA17B4F71CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:*",
                     matchCriteriaId: "9F03E847-748B-43BD-B6C1-BFDECE99BC3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71FB14A-67D4-4EDD-BB32-07764F5AFA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
                     matchCriteriaId: "1E3B807C-196D-42B8-9042-7582A1366772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
                     matchCriteriaId: "83FEEE8F-9279-46F2-BAF9-A60537020C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
                     matchCriteriaId: "1DD0B95A-7C9F-4A18-9CD8-BA344DEFC9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
                     matchCriteriaId: "1F294E43-73FA-4EF3-90F2-EE29C56D6573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
                     matchCriteriaId: "EDDE1048-BFEA-4A3E-8270-27C538A68837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
                     matchCriteriaId: "CC517CD0-FF35-498F-AD33-683B43CA3829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
                     matchCriteriaId: "53F7E1C5-BFA9-426C-9F95-3EA5DB458C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
                     matchCriteriaId: "C2B5ED13-F998-447C-8FEA-047FE9FE2F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
                     matchCriteriaId: "65F3CD2A-D5E1-4EFF-9013-6D81B396F765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
                     matchCriteriaId: "962CCED8-E321-4878-9BE6-0DC33778559A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
                     matchCriteriaId: "2B08B97A-5D4D-405B-A1C4-9E327E4EED35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
                     matchCriteriaId: "738C1061-E8B8-4924-AFE9-5E59F22CA4A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
                     matchCriteriaId: "9071DC8C-D0AA-448E-82BF-7C801199193F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*",
                     matchCriteriaId: "395CC50B-9042-4B12-9A1C-A8D5D571DC25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
                     matchCriteriaId: "F0396190-54A5-4F11-8530-B5EC7BCBC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*",
                     matchCriteriaId: "E56CF063-0CB3-4BD6-978B-B9D7C0C8C4AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF2039C-E08C-472F-82E6-DAD3F94724B5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71FB14A-67D4-4EDD-BB32-07764F5AFA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
                     matchCriteriaId: "1E3B807C-196D-42B8-9042-7582A1366772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
                     matchCriteriaId: "83FEEE8F-9279-46F2-BAF9-A60537020C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
                     matchCriteriaId: "BBD36C0D-0F44-4349-968D-4CD60F281D84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*",
                     matchCriteriaId: "3E364FE2-5FB1-4E14-8DF5-CA21F4BFBBC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*",
                     matchCriteriaId: "7F22C4C2-20E0-428F-A9BF-37E8BD63A9E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*",
                     matchCriteriaId: "71334963-7BF1-49DB-84E6-D6F2A927458B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
                     matchCriteriaId: "1DD0B95A-7C9F-4A18-9CD8-BA344DEFC9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
                     matchCriteriaId: "1F294E43-73FA-4EF3-90F2-EE29C56D6573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
                     matchCriteriaId: "EDDE1048-BFEA-4A3E-8270-27C538A68837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
                     matchCriteriaId: "CC517CD0-FF35-498F-AD33-683B43CA3829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
                     matchCriteriaId: "53F7E1C5-BFA9-426C-9F95-3EA5DB458C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
                     matchCriteriaId: "C2B5ED13-F998-447C-8FEA-047FE9FE2F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
                     matchCriteriaId: "65F3CD2A-D5E1-4EFF-9013-6D81B396F765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
                     matchCriteriaId: "962CCED8-E321-4878-9BE6-0DC33778559A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
                     matchCriteriaId: "2B08B97A-5D4D-405B-A1C4-9E327E4EED35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
                     matchCriteriaId: "738C1061-E8B8-4924-AFE9-5E59F22CA4A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
                     matchCriteriaId: "9071DC8C-D0AA-448E-82BF-7C801199193F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*",
                     matchCriteriaId: "395CC50B-9042-4B12-9A1C-A8D5D571DC25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
                     matchCriteriaId: "F0396190-54A5-4F11-8530-B5EC7BCBC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*",
                     matchCriteriaId: "E56CF063-0CB3-4BD6-978B-B9D7C0C8C4AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79A8847B-4F98-4949-8639-5CD2B411D10F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC5478F-A047-4F6D-BB11-0077A74C0174",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71FB14A-67D4-4EDD-BB32-07764F5AFA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
                     matchCriteriaId: "1E3B807C-196D-42B8-9042-7582A1366772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
                     matchCriteriaId: "83FEEE8F-9279-46F2-BAF9-A60537020C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
                     matchCriteriaId: "BBD36C0D-0F44-4349-968D-4CD60F281D84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*",
                     matchCriteriaId: "3E364FE2-5FB1-4E14-8DF5-CA21F4BFBBC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*",
                     matchCriteriaId: "7F22C4C2-20E0-428F-A9BF-37E8BD63A9E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*",
                     matchCriteriaId: "71334963-7BF1-49DB-84E6-D6F2A927458B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
                     matchCriteriaId: "1DD0B95A-7C9F-4A18-9CD8-BA344DEFC9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
                     matchCriteriaId: "1F294E43-73FA-4EF3-90F2-EE29C56D6573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
                     matchCriteriaId: "EDDE1048-BFEA-4A3E-8270-27C538A68837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
                     matchCriteriaId: "CC517CD0-FF35-498F-AD33-683B43CA3829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
                     matchCriteriaId: "53F7E1C5-BFA9-426C-9F95-3EA5DB458C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
                     matchCriteriaId: "C2B5ED13-F998-447C-8FEA-047FE9FE2F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
                     matchCriteriaId: "65F3CD2A-D5E1-4EFF-9013-6D81B396F765",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:*",
                     matchCriteriaId: "5582D0E6-292E-487B-9DAC-143D5D1C0D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
                     matchCriteriaId: "962CCED8-E321-4878-9BE6-0DC33778559A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
                     matchCriteriaId: "2B08B97A-5D4D-405B-A1C4-9E327E4EED35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
                     matchCriteriaId: "738C1061-E8B8-4924-AFE9-5E59F22CA4A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
                     matchCriteriaId: "9071DC8C-D0AA-448E-82BF-7C801199193F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:*",
                     matchCriteriaId: "395CC50B-9042-4B12-9A1C-A8D5D571DC25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
                     matchCriteriaId: "F0396190-54A5-4F11-8530-B5EC7BCBC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:*",
                     matchCriteriaId: "E56CF063-0CB3-4BD6-978B-B9D7C0C8C4AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9AE81FA-B0F3-4F0B-A2D1-2BB590345058",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EB08A27-7777-4538-ADC4-9D2F89963C13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AC40ABB-E364-46C9-A904-C0ED02806250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "BBE35BDC-7739-4854-8BB8-E8600603DE9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "2DC47132-9EEA-4518-8F86-5CD231FBFB61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "CD5A30CE-9498-4007-8E66-FD0CC6CF1836",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D571B57-4F4C-4232-9D3B-B2F7AAAB220B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3661BC68-6F32-447F-8D20-FD73FBBED9C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "50B47EC5-0276-4799-B536-12B33B5F003B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "64EB45C0-E3BD-4C0D-9E97-1DB726D66401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E889BF9C-BDDF-4A6A-97BB-00A097EF6D91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "7D45F2C3-20FF-4A91-A440-E109B3CCE7C9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F69A0E5-B61B-405D-B501-9CB306651CEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "38A40E03-F915-4888-87B0-5950F75F097D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "974B6128-ABD2-4D9C-87A1-5F1740DDCB95",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBF736F6-ED05-4DC1-96FB-3F35BA5B3EFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B0A756E2-C320-405A-B24F-7C5022649E5A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Protocol Independent Multicast (PIM) protocol within the VPN. This issue can only be exploited from the PE device within the MPLS domain which is capable of forwarding IP multicast traffic in core. End-users connected to the CE device cannot cause this crash. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 12.3 versions prior to 12.3R12-S10; 12.3X48 versions prior to 12.3X48-D70 on SRX Series; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 versions prior to 15.1X49-D140 on SRX Series; 15.1X53 versions prior to 15.1X53-D59 on EX2300/EX3400 Series; 15.1X53 versions prior to 15.1X53-D67 on QFX10K Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D471, 15.1X53-D490 on NFX Series; 16.1 versions prior to 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 versions prior to 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R1-S3, 17.4R2; 18.1 versions prior to 18.1R2. No other Juniper Networks products or platforms are affected by this issue.",
      },
      {
         lang: "es",
         value: "La recepción de un paquete de control Draft-Rosen MVPN específico podría provocar que el proceso RPD (Routing Protocol Daemon) se cierre inesperadamente y se reinicie o desemboque en la ejecución remota de código. Mediante el envío continuo del mismo paquete de control Draft-Rosen MVPN específico, un atacante puede cerrar repetidamente el proceso RPD, provocando una denegación de servicio (DoS) prolongada. Este problema podría ocurrir cuando el dispositivo Junos OS está configurado para redes privadas virtuales multicanal de Draft-Rosen (MVPN). La VPN  es multicanal y está configurada para emplear el protocolo PIM (Protocol Independent Multicast) en la VPN. Este problema solo puede ser explotado desde el dispositivo PE en el dominio MPLS que puede reenviar tráfico multicanal IP en el núcleo. Los usuarios finales conectados al dispositivo CE no pueden provocar este cierre inesperado. Las versiones afectadas de Juniper Networks Junos OS son: 12.1X46 en versiones anteriores a la 12.1X46-D77 en SRX Series; 12.3 en versiones anteriores a la 12.3R12-S10; 12.3X48 en versiones anteriores a la 12.3X48-D70 en SRX Series; 15.1 en versiones anteriores a la 15.1R4-S9, 15.1R6-S6, 15.1R7; 15.1F6; 15.1X49 en versiones anteriores a la 15.1X49-D140 en SRX Series; 15.1X53 en versiones anteriores a la 15.1X53-D59 en EX2300/EX3400 Series; 15.1X53 en versiones anteriores a la 15.1X53-D67 en QFX10K Series; 15.1X53 en versiones anteriores a la 15.1X53-D233 en QFX5200/QFX5110 Series; 15.1X53 en versiones anteriores a la 15.1X53-D471, 15.1X53-D490 en NFX Series; 16.1 en versiones anteriores a la 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.2 en versiones anteriores a la 16.2R1-S6, 16.2R2-S6, 16.2R3; 17.1 en versiones anteriores a la 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 en versiones anteriores a la 17.2R2-S4, 17.2R3; 17.3 en versiones anteriores a la 17.3R2-S2, 17.3R3; 17.4 en versiones anteriores a la 17.4R1-S3, 17.4R2 y 18.1 en versiones anteriores a la 18.1R2. No hay ningún otro producto o plataforma de Juniper Networks que se vea afectado por este problema.",
      },
   ],
   id: "CVE-2018-0045",
   lastModified: "2024-11-21T03:37:25.300",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-10-10T18:29:00.670",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041848",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA10879",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1041848",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA10879",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-04-12 16:15
Modified
2025-04-11 14:09
Summary
A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device. If a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed. This issue affects Junos OS: * All versions before 20.4R3-S7, * 21.1 versions before 21.1R3,  * 21.2 versions before 21.2R2-S1, 21.2R3,  * 21.3 versions before 21.3R1-S2, 21.3R2.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C",
                     versionEndExcluding: "20.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B10DFCE-5331-4D79-8D9F-EF84743493D3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device.\n\nIf a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed.\nThis issue affects Junos OS:\n\n\n\n  *  All versions before 20.4R3-S7,\n  *  21.1 versions before 21.1R3, \n  *  21.2 versions before 21.2R2-S1, 21.2R3, \n  *  21.3 versions before 21.3R1-S2, 21.3R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de autenticación faltante para función crítica en el motor de reenvío de paquetes (pfe) de Juniper Networks Junos OS en la serie MX con SPC3 y la serie SRX permite que un atacante basado en red no autenticado cause un impacto limitado en la integridad o disponibilidad del dispositivo. Si un dispositivo está configurado con el algoritmo de autenticación IPsec hmac-sha-384 o hmac-sha-512, los túneles se establecen normalmente, pero para el tráfico que atraviesa el túnel no se envía información de autenticación con los datos cifrados en la salida y no se espera información de autenticación en ingreso. Entonces, si el par es un dispositivo no afectado, el tráfico de tránsito fallará en ambas direcciones. Si el par es un dispositivo también afectado, el tráfico de tránsito funciona, pero sin autenticación, y los comandos operativos de configuración y CLI indican que se realiza la autenticación. Este problema afecta a Junos OS: todas las versiones anteriores a 20.4R3-S7, versiones 21.1 anteriores a 21.1R3, versiones 21.2 anteriores a 21.2R2-S1, 21.2R3, versiones 21.3 anteriores a 21.3R1-S2, 21.3R2.",
      },
   ],
   id: "CVE-2024-30391",
   lastModified: "2025-04-11T14:09:43.030",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 4.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 2.5,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
      cvssMetricV40: [
         {
            cvssData: {
               Automatable: "NOT_DEFINED",
               Recovery: "NOT_DEFINED",
               Safety: "NOT_DEFINED",
               attackComplexity: "LOW",
               attackRequirements: "PRESENT",
               attackVector: "NETWORK",
               availabilityRequirement: "NOT_DEFINED",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityRequirement: "NOT_DEFINED",
               exploitMaturity: "NOT_DEFINED",
               integrityRequirement: "NOT_DEFINED",
               modifiedAttackComplexity: "NOT_DEFINED",
               modifiedAttackRequirements: "NOT_DEFINED",
               modifiedAttackVector: "NOT_DEFINED",
               modifiedPrivilegesRequired: "NOT_DEFINED",
               modifiedSubAvailabilityImpact: "NOT_DEFINED",
               modifiedSubConfidentialityImpact: "NOT_DEFINED",
               modifiedSubIntegrityImpact: "NOT_DEFINED",
               modifiedUserInteraction: "NOT_DEFINED",
               modifiedVulnAvailabilityImpact: "NOT_DEFINED",
               modifiedVulnConfidentialityImpact: "NOT_DEFINED",
               modifiedVulnIntegrityImpact: "NOT_DEFINED",
               privilegesRequired: "NONE",
               providerUrgency: "NOT_DEFINED",
               subAvailabilityImpact: "NONE",
               subConfidentialityImpact: "NONE",
               subIntegrityImpact: "NONE",
               userInteraction: "NONE",
               valueDensity: "NOT_DEFINED",
               vectorString: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
               version: "4.0",
               vulnAvailabilityImpact: "LOW",
               vulnConfidentialityImpact: "NONE",
               vulnIntegrityImpact: "LOW",
               vulnerabilityResponseEffort: "NOT_DEFINED",
            },
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-12T16:15:38.773",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://supportportal.juniper.net/JSA79188",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Not Applicable",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://supportportal.juniper.net/JSA79188",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 15:15
Modified
2024-11-21 06:46
Summary
A Missing Release of Memory after Effective Lifetime vulnerability in the Application Quality of Experience (appqoe) subsystem of the PFE of Juniper Networks Junos OS on SRX Series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). Upon receiving specific traffic a memory leak will occur. Sustained processing of such specific traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. A device is only vulnerable when advance(d) policy based routing (APBR) is configured and AppQoE (sla rule) is not configured for these APBR rules. This issue affects Juniper Networks Junos OS on SRX Series: 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.3R1.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Release of Memory after Effective Lifetime vulnerability in the Application Quality of Experience (appqoe) subsystem of the PFE of Juniper Networks Junos OS on SRX Series allows an unauthenticated network based attacker to cause a Denial of Service (DoS). Upon receiving specific traffic a memory leak will occur. Sustained processing of such specific traffic will eventually lead to an out of memory condition that prevents all services from continuing to function, and requires a manual restart to recover. A device is only vulnerable when advance(d) policy based routing (APBR) is configured and AppQoE (sla rule) is not configured for these APBR rules. This issue affects Juniper Networks Junos OS on SRX Series: 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.3R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Falta de Liberación de Memoria después del Tiempo de Vida Efectivo en el subsistema Application Quality of Experience (appqoe) del PFE de Junos OS de la serie SRX de Juniper Networks permite a un atacante no autenticado basado en la red causar una Denegación de Servicio (DoS). Al recibir un tráfico específico, será producida una pérdida de memoria. El procesamiento sostenido de dicho tráfico específico conllevará finalmente a una condición de falta de memoria que impedirá que todos los servicios sigan funcionando y requerirá un reinicio manual para recuperarse. Un dispositivo sólo es vulnerable cuando ha sido configurado el enrutamiento basado en políticas (APBR) y no ha sido configurado AppQoE (regla sla) para estas reglas APBR. Este problema afecta a Juniper Networks Junos OS en la serie SRX: versiones 20.3 anteriores a 20.3R3-S2; versiones 20.4 anteriores a 20.4R3-S2; versiones 21.1 anteriores a 21.1R3; versiones 21.2 anteriores a 21.2R2-S1, 21.2R3; versiones 21.3 anteriores a 21.3R1-S2, 21.3R2. Este problema no afecta a versiones del Sistema Operativo Junos de Juniper Networks anteriores a 20.3R1",
      },
   ],
   id: "CVE-2022-22205",
   lastModified: "2024-11-21T06:46:23.317",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-20T15:15:08.457",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69709",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69709",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-23 13:15
Modified
2024-11-21 05:54
Summary
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
References
security-officer@isc.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdfPatch, Third Party Advisory
security-officer@isc.orghttps://kb.isc.org/v1/docs/cve-2021-25220Mitigation, Vendor Advisory
security-officer@isc.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
security-officer@isc.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
security-officer@isc.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
security-officer@isc.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
security-officer@isc.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
security-officer@isc.orghttps://security.gentoo.org/glsa/202210-25Third Party Advisory
security-officer@isc.orghttps://security.netapp.com/advisory/ntap-20220408-0001/Third Party Advisory
security-officer@isc.orghttps://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdfPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/v1/docs/cve-2021-25220Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202210-25Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20220408-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US
Impacted products
Vendor Product Version
isc bind *
isc bind *
isc bind *
isc bind *
isc bind *
fedoraproject fedora 34
fedoraproject fedora 35
fedoraproject fedora 36
netapp h300s_firmware -
netapp h300s -
netapp h500s_firmware -
netapp h500s -
netapp h700s_firmware -
netapp h700s -
netapp h300e_firmware -
netapp h300e -
netapp h500e_firmware -
netapp h500e -
netapp h700e_firmware -
netapp h700e -
netapp h410s_firmware -
netapp h410s -
netapp h410c_firmware -
netapp h410c -
siemens sinec_ins *
siemens sinec_ins 1.0
siemens sinec_ins 1.0
juniper junos *
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "A758DF9F-434B-4A5A-A1DB-632F23BD7EA0",
                     versionEndExcluding: "9.11.37",
                     versionStartIncluding: "9.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:supported_preview:*:*:*",
                     matchCriteriaId: "73EF3289-D1C2-4AD9-8175-5B060BB98D52",
                     versionEndExcluding: "9.11.37",
                     versionStartIncluding: "9.11.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "0001CEE2-7B7E-4499-B2BA-FD50F3EB2A2F",
                     versionEndExcluding: "9.16.27",
                     versionStartIncluding: "9.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:supported_preview:*:*:*",
                     matchCriteriaId: "C6E69BDE-904C-41D7-88C2-586C3E319499",
                     versionEndExcluding: "9.16.27",
                     versionStartIncluding: "9.16.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
                     matchCriteriaId: "F30CB574-6B4F-4FF1-9729-E5F14FFD7257",
                     versionEndIncluding: "9.18.0",
                     versionStartIncluding: "9.17.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "108A2215-50FB-4074-94CF-C130FA14566D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32F0B6C0-F930-480D-962B-3F4EFDCC13C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "803BC414-B250-4E3A-A478-A3881340D6B8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FEB3337-BFDE-462A-908B-176F92053CEC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "736AEAE9-782B-4F71-9893-DED53367E102",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C89891C1-DFD7-4E1F-80A9-7485D86A15B5",
                     versionEndExcluding: "1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "4664B195-AF14-4834-82B3-0B2C98020EB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "75BC588E-CDF0-404E-AD61-02093A1DF343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECFE39BF-15FB-4129-9D8C-4F28DABB5D83",
                     versionEndExcluding: "19.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "55F3E730-83F2-43C2-B6DC-77BAABB2F01D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "45DA4D89-1362-421F-8218-585CE5D60E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.",
      },
      {
         lang: "es",
         value: "BIND versiones 9.11.0 posteriores a 9.11.36, versiones 9.12.0 posteriores a 9.16.26, versiones 9.17.0 posteriores a 9.18.0, Ediciones Preliminares Soportadas con BIND: versiones .11.4-S1 posteriores a 9.11.36-S1, versiones 9.16.8-S1 posteriores a 9.16.26-S1, también creemos que las versiones de BIND 9 anteriores a las mostradas - hasta la versión 9.1.0, incluyendo las ediciones preliminares soportadas - también están afectadas pero no han sido probadas ya que son EOL. La caché podría envenenarse con registros incorrectos, conllevando a una realización de consultas a servidores erróneos, lo que también podría resultar en que se devolviera información falsa a clientes",
      },
   ],
   id: "CVE-2021-25220",
   lastModified: "2024-11-21T05:54:34.523",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 4,
            source: "security-officer@isc.org",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2022-03-23T13:15:07.680",
   references: [
      {
         source: "security-officer@isc.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/v1/docs/cve-2021-25220",
      },
      {
         source: "security-officer@isc.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/",
      },
      {
         source: "security-officer@isc.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/",
      },
      {
         source: "security-officer@isc.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/",
      },
      {
         source: "security-officer@isc.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/",
      },
      {
         source: "security-officer@isc.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202210-25",
      },
      {
         source: "security-officer@isc.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220408-0001/",
      },
      {
         source: "security-officer@isc.org",
         url: "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://kb.isc.org/v1/docs/cve-2021-25220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202210-25",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20220408-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US",
      },
   ],
   sourceIdentifier: "security-officer@isc.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-444",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-19 01:15
Modified
2024-11-21 06:46
Summary
A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de desbordamiento del búfer en la región Stack de la memoria en el demonio de procesamiento de flujos (flowd) del Sistema Operativo Junos de Juniper Networks en las series MX y SRX permite a un atacante no autenticado conectado a la red causar un bloqueo de flowd y, por tanto, una denegación de servicio (DoS). La recepción continuada de estos paquetes específicos causará una condición de denegación de servicio sostenida. Este problema puede ser desencadenado por un paquete específico de Invitación del Protocolo de Iniciación de Sesión (SIP) si el SIP ALG está habilitado. Debido a esto, el PIC sería reiniciado y todo el tráfico que atraviesa el PIC se caerá. Este problema afecta: Juniper Networks Junos OS versiones 20.4 anteriores a 20.4R3-S2; versiones 21.1 anteriores a 21.1R2-S1, 21.1R3; versiones 21.2 anteriores a 21.2R2; 21.3 versiones anteriores a 21.3R2. Este problema no afecta a versiones del Sistema Operativo Junos de Juniper Networks anteriores a 20.4R1",
      },
   ],
   id: "CVE-2022-22178",
   lastModified: "2024-11-21T06:46:19.727",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-19T01:15:09.577",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11284",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11284",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-121",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-27 15:18
Modified
2025-01-27 21:40
Summary
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of integrity or confidentiality, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 21.2 versions prior to 21.2R3-S8; * 21.4 versions prior to 21.4R3-S6; * 22.1 versions prior to 22.1R3-S5; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S2; * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2.
Impacted products
Vendor Product Version
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper ex2200 -
juniper ex2200-c -
juniper ex2200-vc -
juniper ex2300 -
juniper ex2300-24mp -
juniper ex2300-24p -
juniper ex2300-24t -
juniper ex2300-48mp -
juniper ex2300-48p -
juniper ex2300-48t -
juniper ex2300-c -
juniper ex2300m -
juniper ex3200 -
juniper ex3300 -
juniper ex3300-vc -
juniper ex3400 -
juniper ex4200 -
juniper ex4200-vc -
juniper ex4300 -
juniper ex4300-24p -
juniper ex4300-24p-s -
juniper ex4300-24t -
juniper ex4300-24t-s -
juniper ex4300-32f -
juniper ex4300-32f-dc -
juniper ex4300-32f-s -
juniper ex4300-48mp -
juniper ex4300-48mp-s -
juniper ex4300-48p -
juniper ex4300-48p-s -
juniper ex4300-48t -
juniper ex4300-48t-afi -
juniper ex4300-48t-dc -
juniper ex4300-48t-dc-afi -
juniper ex4300-48t-s -
juniper ex4300-48tafi -
juniper ex4300-48tdc -
juniper ex4300-48tdc-afi -
juniper ex4300-mp -
juniper ex4300-vc -
juniper ex4300m -
juniper ex4400 -
juniper ex4500 -
juniper ex4500-vc -
juniper ex4550 -
juniper ex4550-vc -
juniper ex4550\/vc -
juniper ex4600 -
juniper ex4600-vc -
juniper ex4650 -
juniper ex6200 -
juniper ex6210 -
juniper ex8200 -
juniper ex8200-vc -
juniper ex8208 -
juniper ex8216 -
juniper ex9200 -
juniper ex9204 -
juniper ex9208 -
juniper ex9214 -
juniper ex9250 -
juniper ex9251 -
juniper ex9253 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   cisaActionDue: "2023-11-17",
   cisaExploitAdd: "2023-11-13",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C470FB4E-A927-4AF3-ACB0-AD1E264218B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EFF72FCA-C440-4D43-9BDB-F712DB413717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "DE69E9E3-00FC-41BF-9109-617668CF9A0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F1B16FF0-900F-4AEE-B670-A537139F6909",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE3D4F71-8476-4F0D-A976-A308D6483D6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BD5636-93D5-4C06-964F-00055DF6B2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3302CB-457F-4BD2-B80B-F70FB4C4542E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3A0D9C0-34D3-430F-ABFA-B68010A8825D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E04B126-F290-4242-BB80-5F573D623E6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "671D9977-7657-48C7-A07C-4AED54380A86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E100C3C-070D-4132-927F-756538B91491",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2032E7DD-96FD-48B7-922C-5FE04675796C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D907D6A-B7C4-4A10-AA58-0F908575A435",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979C3597-C53B-4F4B-9EA7-126DA036C86D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A536DA-5A57-4255-AB22-F99F8B7FF62A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7A20FC-A19F-4881-A0E8-C440E9FE60D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC326549-217D-4194-8310-AB398D6FF3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DAF5E7-E610-4D74-8573-41C16D642837",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53269C69-3D1E-4F05-8EF6-81743D7A699E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E594D6DC-87F6-40D2-8268-ED6021462168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592377CC-4044-4FDD-A3DF-CBF25754EE4D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E63215-246E-49F3-A537-8A90D512DAB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD1A5E69-928A-41A0-8B9B-91F307D99854",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B71953D-016D-4E72-B598-55667A507681",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CABBC37B-EB93-424D-A1E7-4686039C0955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24526B69-E3E3-4249-80A4-A886BED5C07E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2209605-65B6-44B3-9700-9EC543BF2408",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3C348CF-65C1-4A53-8F4F-99B5A4113679",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60CB5F91-DC40-4D09-BB93-4539B8581877",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A17D793-5F01-4818-956D-D6BC5A6C4CEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF34EC-A154-4042-BE0B-B2BA9EEDEE93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DC1840-7409-4BD0-9522-B55B1166CF9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9EECCB3-37B3-4146-8F8C-4BBFF84499E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "303ADB06-5CB5-44DA-8387-39FACC539EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDEE8AE4-B393-442C-AD68-4AC43E76A8F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D842407-7A13-47C7-BBC9-FB0E978221CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E98077-92AF-4E3E-96F0-2E6F9D6343D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3612D798-7A5F-4068-A5A2-92173893450E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BB20B5-EA30-4E8E-9055-2E629648436A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3ECB975-D1A0-4318-9C5E-752A3C98F76F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B425BB1-3C78-42B1-A6C1-216E514191F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC1C89-B37F-4C5F-9F79-12997C79711D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FF88C7-89CB-4E04-BADA-AD64F8060C6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AFE829C-325D-4E66-A6A2-A81BE8BCAB72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B74B12A6-1CE2-4293-ABA5-E3F23E15485C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E67A5A-0DFF-42D9-81A7-570E9BCA463D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51C5371-51E9-40AE-8619-BC1267DD1D08",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D08A8D94-134A-41E7-8396-70D8B0735E9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E82CE3-F43D-4B29-A64D-B14ADB6CC357",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C0199E-B9F0-41D3-B625-083990517CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8790B456-DFC7-4E82-9A0C-C89787139B79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "079290E9-DCC5-43F7-9480-64874DBF2696",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EA71434-CCBF-4A55-8B30-D213A43E8641",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to \n\nwebauth_operation.php\n\nthat doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of \n\nintegrity or confidentiality, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n  *  \n\n21.2 versions prior to 21.2R3-S8;\n  *  21.4 \n\nversions prior to \n\n21.4R3-S6;\n  *  22.1 \n\nversions prior to \n\n22.1R3-S5;\n  *  22.2 \n\nversions prior to \n\n22.2R3-S3;\n  *  22.3 \n\nversions prior to \n\n22.3R3-S2;\n  *  22.4 versions prior to 22,4R2-S2, 22.4R3;\n  *  23.2 versions prior to \n\n23.2R1-S2, 23.2R2.\n\n\n",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de autenticación faltante para funciones críticas en Juniper Networks Junos OS en la serie SRX permite que un atacante basado en red no autenticado cause un impacto limitado en la integridad del sistema de archivos. Con una solicitud específica a webauth_operation.php que no requiere autenticación, un atacante puede cargar archivos arbitrarios a través de J-Web, lo que provoca una pérdida de integridad de una determinada parte del sistema de archivos, lo que puede permitir el encadenamiento a otras vulnerabilidades. . Este problema afecta a Juniper Networks Junos OS en la serie SRX: * Versiones 22.4 anteriores a 22,4R2-S2, 22.4R3; * Versiones 23.2 anteriores a 23.2R2.",
      },
   ],
   id: "CVE-2023-36851",
   lastModified: "2025-01-27T21:40:19.750",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-27T15:18:54.877",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA72300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA72300",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-306",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-19 01:15
Modified
2024-11-21 06:46
Summary
An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.2
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.3
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 18.4
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.1
juniper junos 19.2
juniper junos 19.2
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E927B74-FBDA-4235-96D5-4E0735F3EDB3",
                     versionEndExcluding: "18.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "A8B5BD93-3C11-45D5-ACF0-7C4C01106C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r:*:*:*:*:*:*",
                     matchCriteriaId: "9359A058-6B77-4DEE-B28A-D5CD906EBAFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "167EEC4F-729E-47C2-B0F8-E8108CE3E985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
                     matchCriteriaId: "90BF177D-A895-4D05-B674-B27420A5DC6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0070B31B-59DC-46E9-93E0-1E8BF3560BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A893CCE5-96B8-44A1-ABEF-6AB9B527B2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "42203801-E2E7-4DCF-ABBB-D23A91B2A9FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "238EC996-8E8C-4332-916F-09E54E6EBB9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "5F711936-33A1-47FC-A6A0-A63088915815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "21B7820C-01D2-401C-9E6D-C83994FD5961",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3D2FBD29-2CAC-41B4-9336-671373EF4A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EEFCDA90-67E2-4AEF-800C-1D29A9121B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "74B99981-840F-4DAD-976A-5DAEFE9FB93D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "BDD3ADB9-35FF-41D3-92BD-98D6D4826B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "341F2459-8335-40E9-A2B3-BE804D319F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "0CD17956-8E8C-489D-927A-5709C05EA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "27D9AEBC-2CA3-4E17-9543-D60B10BA2AE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "1BB9C2BB-D20B-41E9-B75F-7FAD9ECCDB99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*",
                     matchCriteriaId: "1B40785E-8A3C-4087-B2B9-9A2E4BEFF421",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5342C3DC-D640-47AB-BD76-3444852988A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8AB8585E-EDC6-4400-BEE3-3A6A7C922C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A2ABC574-B3FC-4025-B50D-7F9EEB28C806",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "6F6EAFC3-C3AC-4361-8530-39FCF89702F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "92FB1BF6-8852-45D8-817C-36CDBE730801",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6B363298-315C-4FD5-9417-C5B82883A224",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "EB08FF7B-01F5-4A19-858E-E2CD19D61A62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "B7A3FBD3-5399-42A9-9BD9-E3C981CBD6DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD361C-8B4D-43EF-8B82-9FE165D8206E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "6E7539C4-6208-43EB-9A0B-4852D0CE0FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "35299B02-DC75-458D-B86D-8A0DB95B06AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC3EF2-3339-4E3C-9C6D-E854EBBDEF9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "74CA9010-D3DE-487B-B46F-589A48AB0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A38F224C-8E9B-44F3-9D4F-6C9F04F57927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "853F146A-9A0F-49B6-AFD2-9907434212F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8F73B88B-E66C-4ACD-B38D-9365FB230ABA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "EE1F82EC-3222-4158-8923-59CDA1909A9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "8FE95D15-B5E5-4E74-9464-C72D8B646A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "C012CD07-706A-4E1C-B399-C55AEF5C8309",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "A0C26E59-874A-4D87-9E7F-E366F4D65ED1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
                     matchCriteriaId: "75902119-60D0-49F8-8E01-666E0F75935A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "D59D7A31-128B-4034-862B-8EF3CE3EE949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "0C5E097B-B79E-4E6A-9291-C8CB9674FED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "819FA3ED-F934-4B20-BC0E-D638ACCB7787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3D7D773A-4988-4D7C-A105-1885EBE14426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "1BD93674-9375-493E-BD6C-8AD41CC75DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "34E28FD9-1089-42F7-8586-876DBEC965DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "B7E72C49-1849-4A6F-81BC-D03F06D47D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "541535BD-20DC-4489-91A7-F6CBC6802352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
                     matchCriteriaId: "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "768C0EB7-8456-4BF4-8598-3401A54D21DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5332B70A-F6B0-4C3B-90E2-5CBFB3326126",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "81439FE8-5405-45C2-BC04-9823D2009A77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E506138D-043E-485D-B485-94A2AB75F8E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0EF3C901-3599-463F-BEFB-8858768DC195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
                     matchCriteriaId: "02B42BE8-1EF2-47F7-9F10-DE486A017EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
                     matchCriteriaId: "0B372356-D146-420B-95C3-381D0383B595",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "0E7545CE-6300-4E81-B5AF-2BE150C1B190",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4CA3060F-1800-4A06-A453-FB8CE4B65312",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.",
      },
      {
         lang: "es",
         value: "Una Complejidad Algorítmica no Suficiente Combinada con una vulnerabilidad de Asignación de Recursos sin Límites o Estrangulamiento en el demonio de procesamiento de flujos (flowd) de Junos OS de Juniper Networks en las series SRX y MX con SPC3 permite a un atacante de red no autenticado causar latencia en el procesamiento de paquetes en tránsito e incluso la pérdida de paquetes. Si el tráfico de tránsito incluye un porcentaje significativo (más del 5%) de paquetes fragmentados que deben volver a ensamblarse, puede observarse una alta latencia o pérdidas de paquetes. Este problema afecta a Juniper Networks Junos OS en las series SRX y MX con SPC3: todas las versiones anteriores a 18.2R3; versiones 18.3 anteriores a 18.3R3; versiones 18.4 anteriores a 18.4R2-S9, 18.4R3; versiones 19.1 anteriores a 19.1R2; versiones 19.2 anteriores a 19.2R1-S1, versión 19.2R2",
      },
   ],
   id: "CVE-2022-22153",
   lastModified: "2024-11-21T06:46:15.933",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-19T01:15:08.197",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11261",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11261",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-407",
            },
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-13 00:15
Modified
2024-11-21 07:44
Summary
An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper Networks Junos OS on SRX series and MX with SPC3 allows an authenticated, network-based attacker to cause a Denial of Service (DoS). iked will crash and restart, and the tunnel will not come up when a peer sends a specifically formatted payload during the negotiation. This will impact other IKE negotiations happening at the same time. Continued receipt of this specifically formatted payload will lead to continuous crashing of iked and thereby the inability for any IKE negotiations to take place. Note that this payload is only processed after the authentication has successfully completed. So the issue can only be exploited by an attacker who can successfully authenticate. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.3
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 19.4
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper mx10 -
juniper mx10000 -
juniper mx10003 -
juniper mx10008 -
juniper mx10016 -
juniper mx104 -
juniper mx150 -
juniper mx2008 -
juniper mx2010 -
juniper mx2020 -
juniper mx204 -
juniper mx240 -
juniper mx40 -
juniper mx480 -
juniper mx5 -
juniper mx80 -
juniper mx960 -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECFE39BF-15FB-4129-9D8C-4F28DABB5D83",
                     versionEndExcluding: "19.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "59006503-B2CA-4F79-AC13-7C5615A74CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "11B5CC5A-1959-4113-BFCF-E4BA63D918C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "AF24ACBD-5F84-47B2-BFF3-E9A56666269C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "3935A586-41BD-4FA5-9596-DED6F0864777",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B83FB539-BD7C-4BEE-9022-098F73902F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "7659AC36-A5EA-468A-9793-C1EC914D36F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "E0E018E1-568E-40F2-ADA5-F71509811879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "122B09A3-299A-421C-9A6B-B3FEED8E19FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B9295AF3-A883-47C3-BAF8-3D82F719733E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F09D3262-394A-43D1-A4ED-8887FCB20F87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "D3FEA876-302D-4F07-94E6-237C669538F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "B011854A-932C-4D5C-B469-71F72608DFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "94A44054-B47B-453C-BF0F-9E071EFF6542",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "CA3A4806-59AB-43D6-BFE3-A6DCE098335C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "45DA4D89-1362-421F-8218-585CE5D60E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "9B342307-98CF-45C9-9F08-5EB06C679B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "DC743EE4-8833-452A-94DB-655BF139F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "FE96A8EA-FFE3-4D8F-9266-21899149D634",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "C12A75C6-2D00-4202-B861-00FF71585FA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "70FF3DD4-14CB-435D-8529-0480EB853F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
                     matchCriteriaId: "84429093-AB3C-4C05-B8FA-87D94091820F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "4DCFA774-96EF-4018-82CF-95C807025C24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "76022948-4B07-43CB-824C-44E1AB3537CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "25446F60-5CB9-4923-BCE8-609AE3CFDFBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
                     matchCriteriaId: "760E2418-B945-4467-BDAC-7702DDF4C4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
                     matchCriteriaId: "98097AB6-56CB-42E4-96B4-ABBD4F36553C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
                     matchCriteriaId: "7844B380-7986-4B71-B1AE-22D46E5007D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
                     matchCriteriaId: "7EF24AFC-D359-4132-A133-1F6680F7BE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "758275F3-9457-45A2-8F57-65DCD659FC1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46CB928-78B5-4D60-B747-9A0988C7060D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "0886EFA6-47E3-4C1D-A278-D3891A487FED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A209EE6F-E676-4172-8FF3-4E03748DEB13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "EC395200-9A69-468A-8461-D2219B34AA0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "08584FCD-4593-4590-A988-C862295E618A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
                     matchCriteriaId: "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
                     matchCriteriaId: "E69B0ED4-898D-4D7A-9711-8DB00EE3197B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "03009CC1-21AC-4A46-A747-D0C67FCD41DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52699E2B-450A-431C-81E3-DC4483C8B4F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97AF6F8-3D50-4D35-BCB1-54E3BEC69B9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39DA74D-F5C7-4C11-857D-50631A110644",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72C850A-0530-4DB7-A553-7E19F82122B5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FE2089C-F341-4DC1-B76D-633BC699306D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27175D9A-CA2C-4218-8042-835E25DFCA43",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C7FC57-8ACF-45AA-A227-7E3B350FD24F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2754C2DF-DF6E-4109-9463-38B4E0465B77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A26704-A6A4-4C4F-9E12-A0A0259491EF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C982A2FF-A1F9-4830-BAB6-77CFCE1F093F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "104858BD-D31D-40E0-8524-2EC311F10EAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B557965-0040-4048-B56C-F564FF28635B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB875EBD-A3CD-4466-B2A3-39D47FF94592",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5E08E1E-0FE4-4294-9497-BBFFECA2A220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper Networks Junos OS on SRX series and MX with SPC3 allows an authenticated, network-based attacker to cause a Denial of Service (DoS). iked will crash and restart, and the tunnel will not come up when a peer sends a specifically formatted payload during the negotiation. This will impact other IKE negotiations happening at the same time. Continued receipt of this specifically formatted payload will lead to continuous crashing of iked and thereby the inability for any IKE negotiations to take place. Note that this payload is only processed after the authentication has successfully completed. So the issue can only be exploited by an attacker who can successfully authenticate. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de escritura fuera de los límites en el Internet Key Exchange Protocol Daemon (iked) de Juniper Networks Junos OS en la serie SRX y MX con SPC3 permite que un atacante autenticado basado en red provoque una denegación de servicio (DoS). iked fallará y se reiniciará, y el túnel no se activará cuando un par envíe una carga útil formateada específicamente durante la negociación. Esto afectará otras negociaciones IKE que se realicen al mismo tiempo. La recepción continua de esta carga útil formateada específicamente provocará un bloqueo continuo de iked y, por lo tanto, la imposibilidad de que se lleven a cabo negociaciones IKE. Tenga en cuenta que esta carga útil solo se procesa después de que la autenticación se haya completado con éxito. Por lo tanto, el problema sólo puede ser aprovechado por un atacante que pueda autenticarse exitosamente. Este problema afecta a Juniper Networks Junos OS en la serie SRX y la serie MX con SPC3: todas las versiones anteriores a 19.3R3-S7; Versiones 19.4 anteriores a 19.4R3-S9; Versiones 20.2 anteriores a 20.2R3-S5; Versiones 20.3 anteriores a 20.3R3-S5; Versiones 20.4 anteriores a 20.4R3-S4; Versiones 21.1 anteriores a 21.1R3-S3; Versiones 21.2 anteriores a 21.2R3-S2; Versiones 21.3 anteriores a 21.3R3-S1; Versiones 21.4 anteriores a 21.4R2-S1, 21.4R3; Versiones 22.1 anteriores a 22.1R1-S2, 22.1R2.",
      },
   ],
   id: "CVE-2023-22404",
   lastModified: "2024-11-21T07:44:44.940",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-13T00:15:10.840",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70200",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA70200",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-14 15:15
Modified
2024-11-21 08:10
Summary
An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. Service restoration is only possible by rebooting the system. The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations. Other products, platforms, and configurations are not affected by this vulnerability. This issue affects Juniper Networks Junos OS on SRX Series: 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R2-S1, 22.3R3; 22.4 versions prior to 22.4R1-S2, 22.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F68E75-E6C6-4DB4-AE0E-C5637ECE7C88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition.  Service restoration is only possible by rebooting the system.\n\nThe jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations.  Other products, platforms, and configurations are not affected by this vulnerability.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n22.2 versions prior to 22.2R3;\n22.3 versions prior to 22.3R2-S1, 22.3R3;\n22.4 versions prior to 22.4R1-S2, 22.4R2.\n\nThis issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.\n",
      },
   ],
   id: "CVE-2023-36831",
   lastModified: "2024-11-21T08:10:41.753",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-14T15:15:08.913",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA71636",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA71636",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-703",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-14 17:15
Modified
2024-11-21 08:10
Summary
An Out-of-bounds Read vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a local, authenticated attacker with low privileges, to cause a Denial of Service (DoS). If a low privileged user executes a specific CLI command, flowd which is responsible for traffic forwarding in SRX crashes and generates a core dump. This will cause temporary traffic interruption until the flowd process is restarted automatically. Continued execution of this command will lead to a sustained DoS. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S4; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R2; 22.4 versions prior to 22.4R1-S1, 22.4R2.
Impacted products
Vendor Product Version
juniper junos *
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.2
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.3
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 20.4
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.1
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.2
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.3
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.1
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.2
juniper junos 22.3
juniper junos 22.3
juniper junos 22.3
juniper junos 22.4
juniper vsrx -
juniper csrx -
juniper srx100 -
juniper srx110 -
juniper srx1400 -
juniper srx1500 -
juniper srx210 -
juniper srx220 -
juniper srx240 -
juniper srx240h2 -
juniper srx240m -
juniper srx300 -
juniper srx320 -
juniper srx340 -
juniper srx3400 -
juniper srx345 -
juniper srx3600 -
juniper srx380 -
juniper srx4000 -
juniper srx4100 -
juniper srx4200 -
juniper srx4600 -
juniper srx5000 -
juniper srx5400 -
juniper srx550 -
juniper srx550_hm -
juniper srx550m -
juniper srx5600 -
juniper srx5800 -
juniper srx650 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D5DC3ED-1843-467F-903D-2DB6CDFF06F1",
                     versionEndExcluding: "20.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "D4CF52CF-F911-4615-9171-42F84429149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "18DB9401-5A51-4BB3-AC2F-58F58F1C788C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
                     matchCriteriaId: "06F53DA5-59AE-403C-9B1E-41CE267D8BB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "3332262F-81DA-4D78-99C9-514CADA46611",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B46B63A2-1518-4A29-940C-F05624C9658D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "8E0D4959-3865-42A7-98CD-1103EBD84528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
                     matchCriteriaId: "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "681AE183-7183-46E7-82EA-28C398FA1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0A80F23B-CD13-4745-BA92-67C23B297A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "67D4004B-1233-4258-9C7A-F05189146B44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "69E33F24-D480-4B5F-956D-D435A551CBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "6E5E3FDB-3F33-4686-9B64-0152AD41939D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.2:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "9C411A2E-A407-44E5-A2B2-3D049FB2DB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "5C9BC697-C7C9-447D-9EBD-E9711462583E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "7B80433B-57B1-49EF-B1A1-83781D6102E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "A352BB7A-6F17-4E64-BC02-1A7E4CD42653",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "05D8427C-CDDE-4B2F-9CB8-41B9137660E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F3DC01F2-6DFE-4A8E-9962-5E59AA965935",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "7DA0E196-925E-4056-B411-E158702D5D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E33A522F-E35C-4473-9CBD-9C6E5A831086",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE26EB-699B-4B10-87E2-9E731B820F32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "A29E0070-47E9-43DD-9303-C732FE8CC851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "7B798133-105C-448B-B06E-57327E44E478",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:*",
                     matchCriteriaId: "D0D7DB4B-683B-408B-8055-2C992CA43FFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
                     matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "625BA7E6-D2AD-4A48-9B94-24328BE5B06A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "F462F4E3-762C-429F-8D25-5521100DD37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "689FE1AE-7A85-4FB6-AB02-E732F23581B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "79E56DAC-75AD-4C81-9835-634B40C15DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "A0040FE2-7ECD-4755-96CE-E899BA298E0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "076AB086-BB79-4583-AAF7-A5233DFB2F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "72E2DDF6-01DF-4880-AB60-B3DA3281E88D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "54010163-0810-4CF5-95FE-7E62BC6CA4F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
                     matchCriteriaId: "5C1C3B09-3800-493E-A319-57648305FE6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
                     matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
                     matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
                     matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
                     matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
                     matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
                     matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
                     matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
                     matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
                     matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
                     matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
                     matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
                     matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
                     matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
                     matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
                     matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
                     matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
                     matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F68E75-E6C6-4DB4-AE0E-C5637ECE7C88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D4A86D-BDB4-4A01-96FE-7E023C58074B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Out-of-bounds Read vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a local, authenticated attacker with low privileges, to cause a Denial of Service (DoS).\n\nIf a low privileged user executes a specific CLI command, flowd which is responsible for traffic forwarding in SRX crashes and generates a core dump. This will cause temporary traffic interruption until the flowd process is restarted automatically. Continued execution of this command will lead to a sustained DoS.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\nAll versions prior to 20.2R3-S7;\n20.3 version 20.3R1 and later versions;\n20.4 versions prior to 20.4R3-S6;\n21.1 versions prior to 21.1R3-S5;\n21.2 versions prior to 21.2R3-S4;\n21.3 versions prior to 21.3R3-S4;\n21.4 versions prior to 21.4R3-S3;\n22.1 versions prior to 22.1R3-S1;\n22.2 versions prior to 22.2R3;\n22.3 versions prior to 22.3R2;\n22.4 versions prior to 22.4R1-S1, 22.4R2.\n",
      },
   ],
   id: "CVE-2023-36838",
   lastModified: "2024-11-21T08:10:42.900",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-14T17:15:09.210",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA71645",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA71645",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "sirt@juniper.net",
         type: "Primary",
      },
   ],
}