gsd-2024-21606
Vulnerability from gsd
Modified
2023-12-28 06:02
Details
A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
In a remote access VPN scenario, if a "tcp-encap-profile" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.
This issue affects Juniper Networks Junos OS on SRX Series:
* All versions earlier than 20.4R3-S8;
* 21.2 versions earlier than 21.2R3-S6;
* 21.3 versions earlier than 21.3R3-S5;
* 21.4 versions earlier than 21.4R3-S5;
* 22.1 versions earlier than 22.1R3-S3;
* 22.2 versions earlier than 22.2R3-S3;
* 22.3 versions earlier than 22.3R3-S1;
* 22.4 versions earlier than 22.4R2-S2, 22.4R3.
Aliases
{ gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2024-21606", ], details: "\nA Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nIn a remote access VPN scenario, if a \"tcp-encap-profile\" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions earlier than 20.4R3-S8;\n * 21.2 versions earlier than 21.2R3-S6;\n * 21.3 versions earlier than 21.3R3-S5;\n * 21.4 versions earlier than 21.4R3-S5;\n * 22.1 versions earlier than 22.1R3-S3;\n * 22.2 versions earlier than 22.2R3-S3;\n * 22.3 versions earlier than 22.3R3-S1;\n * 22.4 versions earlier than 22.4R2-S2, 22.4R3.\n\n\n\n\n\n\n", id: "GSD-2024-21606", modified: "2023-12-28T06:02:03.461087Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "sirt@juniper.net", ID: "CVE-2024-21606", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Junos OS", version: { version_data: [ { version_affected: "<", version_name: "0", version_value: "20.4R3-S8", }, { version_affected: "<", version_name: "21.2", version_value: "21.2R3-S6", }, { version_affected: "<", version_name: "21.3", version_value: "21.3R3-S5", }, { version_affected: "<", version_name: "21.4", version_value: "21.4R3-S5", }, { version_affected: "<", version_name: "22.1", version_value: "22.1R3-S3", }, { version_affected: "<", version_name: "22.2", version_value: "22.2R3-S3", }, { version_affected: "<", version_name: "22.3", version_value: "22.3R3-S1", }, { version_affected: "<", version_name: "22.4", version_value: "22.4R2-S2, 22.4R3", }, ], }, }, ], }, vendor_name: "Juniper Networks", }, ], }, }, configuration: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>To be exposed to this issue the following configuration needs to be present:</p><code> [security ike gateway <gateway-name> tcp-encap-profile <profile-name> ]</code><br/>", }, ], value: "To be exposed to this issue the following configuration needs to be present:\n\n [security ike gateway <gateway-name> tcp-encap-profile <profile-name> ]\n", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "\nA Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nIn a remote access VPN scenario, if a \"tcp-encap-profile\" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions earlier than 20.4R3-S8;\n * 21.2 versions earlier than 21.2R3-S6;\n * 21.3 versions earlier than 21.3R3-S5;\n * 21.4 versions earlier than 21.4R3-S5;\n * 22.1 versions earlier than 22.1R3-S3;\n * 22.2 versions earlier than 22.2R3-S3;\n * 22.3 versions earlier than 22.3R3-S1;\n * 22.4 versions earlier than 22.4R2-S2, 22.4R3.\n\n\n\n\n\n\n", }, ], }, exploit: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>", }, ], value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n", }, ], generator: { engine: "Vulnogram 0.1.0-av217", }, impact: { cvss: [ { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, ], }, problemtype: { problemtype_data: [ { description: [ { cweId: "CWE-415", lang: "eng", value: "CWE-415 Double Free", }, ], }, { description: [ { lang: "eng", value: "Denial of Service (DoS)", }, ], }, ], }, references: { reference_data: [ { name: "https://supportportal.juniper.net/JSA75747", refsource: "MISC", url: "https://supportportal.juniper.net/JSA75747", }, { name: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", refsource: "MISC", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", }, ], }, solution: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S3, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases.</p>", }, ], value: "The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S3, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1, and all subsequent releases.\n\n", }, ], source: { advisory: "JSA75747", defect: [ "1721936", ], discovery: "USER", }, work_around: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>There are no known workarounds for this issue.</p>", }, ], value: "There are no known workarounds for this issue.\n\n", }, ], }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", matchCriteriaId: "E3A96966-5060-4139-A124-D4E2C879FD6C", versionEndExcluding: "20.4", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", matchCriteriaId: "3D361B23-A3C2-444B-BEB8-E231DA950567", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", matchCriteriaId: "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", matchCriteriaId: "037BA01C-3F5C-4503-A633-71765E9EF774", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", matchCriteriaId: "C54B047C-4B38-40C0-9855-067DCF7E48BD", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", matchCriteriaId: "38984199-E332-4A9C-A4C0-78083D052E15", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", matchCriteriaId: "AA6526FB-2941-4D18-9B2E-472AD5A62A53", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", matchCriteriaId: "09876787-A40A-4340-9C12-8628C325353B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", matchCriteriaId: "41615104-C17E-44DA-AB0D-6E2053BD4EF4", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", matchCriteriaId: "1981DE38-36B5-469D-917E-92717EE3ED53", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", matchCriteriaId: "AFA68ACD-AAE5-4577-B734-23AAF77BC85A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", matchCriteriaId: "65948ABC-22BB-46D5-8545-0806EDB4B86E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", matchCriteriaId: "283E41CB-9A90-4521-96DC-F31AA592CFD8", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", matchCriteriaId: "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", matchCriteriaId: "977DEF80-0DB5-4828-97AC-09BB3111D585", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", matchCriteriaId: "216E7DDE-453D-481F-92E2-9F8466CDDA3F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", matchCriteriaId: "A52AF794-B36B-43A6-82E9-628658624B0A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", matchCriteriaId: "3998DC76-F72F-4452-9150-652140B113EB", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", matchCriteriaId: "36ED4552-2420-45F9-B6E4-6DA2B2B12870", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", matchCriteriaId: "C28A14E7-7EA0-4757-9764-E39A27CFDFA5", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", matchCriteriaId: "4A43752D-A4AF-4B4E-B95B-192E42883A5B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", matchCriteriaId: "42986538-E9D0-4C2E-B1C4-A763A4EE451B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", matchCriteriaId: "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", matchCriteriaId: "E596ABD9-6ECD-48DC-B770-87B7E62EA345", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", matchCriteriaId: "71745D02-D226-44DC-91AD-678C85F5E6FC", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", matchCriteriaId: "39E44B09-7310-428C-8144-AE9DB0484D1F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", matchCriteriaId: "53938295-8999-4316-9DED-88E24D037852", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", matchCriteriaId: "2307BF56-640F-49A8-B060-6ACB0F653A61", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", matchCriteriaId: "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", matchCriteriaId: "CC78A4CB-D617-43FC-BB51-287D2D0C44ED", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", matchCriteriaId: "30FF67F8-1E3C-47A8-8859-709B3614BA6E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", matchCriteriaId: "0C7C507E-C85E-4BC6-A3B0-549516BAB524", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", matchCriteriaId: "6514CDE8-35DC-469F-89A3-078684D18F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", matchCriteriaId: "4624565D-8F59-44A8-B7A8-01AD579745E7", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", matchCriteriaId: "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", matchCriteriaId: "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", matchCriteriaId: "255B6F20-D32F-42C1-829C-AE9C7923558A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", matchCriteriaId: "90AE30DB-C448-4FE9-AC11-FF0F27CDA227", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", matchCriteriaId: "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", matchCriteriaId: "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", matchCriteriaId: "79ED3CE8-CC57-43AB-9A26-BBC87816062D", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", matchCriteriaId: "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", matchCriteriaId: "9962B01C-C57C-4359-9532-676AB81CE8B0", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", matchCriteriaId: "62178549-B679-4902-BFDB-2993803B7FCE", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", matchCriteriaId: "9AD697DF-9738-4276-94ED-7B9380CD09F5", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", matchCriteriaId: "09FF5818-0803-4646-A386-D7C645EE58A3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", matchCriteriaId: "2229FA59-EB24-49A2-85CE-F529A8DE6BA7", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", matchCriteriaId: "0CB280D8-C5D8-4B51-A879-496ACCDE4538", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", matchCriteriaId: "5F3F54F1-75B3-400D-A735-2C27C8CEBE79", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", matchCriteriaId: "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", matchCriteriaId: "0A5B196A-2AF1-4AE5-9148-A75A572807BC", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", matchCriteriaId: "3B457616-2D91-4913-9A7D-038BBF8F1F66", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", matchCriteriaId: "9D157211-535E-4B2D-B2FE-F697FAFDF65C", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", matchCriteriaId: "3F96EBE9-2532-4E35-ABA5-CA68830476A4", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", matchCriteriaId: "B4D936AE-FD74-4823-A824-2D9F24C25BFB", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", matchCriteriaId: "E117E493-F4E1-4568-88E3-F243C74A2662", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", matchCriteriaId: "01E3E308-FD9C-4686-8C35-8472A0E99F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", matchCriteriaId: "3683A8F5-EE0E-4936-A005-DF7F6B75DED3", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", matchCriteriaId: "1B615DBA-8C53-41D4-B264-D3EED8578471", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", matchCriteriaId: "B3124DD0-9E42-4896-9060-CB7DD07FC342", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", matchCriteriaId: "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", matchCriteriaId: "D49FFB60-BA71-4902-9404-E67162919ADC", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", matchCriteriaId: "06156CD6-09D3-4A05-9C5E-BC64A70640F9", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", matchCriteriaId: "E949B21B-AD62-4022-9088-06313277479E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", matchCriteriaId: "8D862E6F-0D01-4B25-8340-888C30F75A2F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", matchCriteriaId: "2F28F73E-8563-41B9-A313-BBAAD5B57A67", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", matchCriteriaId: "E37D4694-C80B-475E-AB5B-BB431F59C5E1", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", matchCriteriaId: "5EC0D2D2-4922-4675-8A2C-57A08D7BE334", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", matchCriteriaId: "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", matchCriteriaId: "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", matchCriteriaId: "786F993E-32CB-492A-A7CC-A7E4F48EA8B9", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", matchCriteriaId: "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", matchCriteriaId: "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", matchCriteriaId: "19519212-51DD-4448-B115-8A20A40192CC", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", matchCriteriaId: "5CC9909E-AE9F-414D-99B1-83AA04D5297B", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", matchCriteriaId: "FDE9E767-4713-4EA2-8D00-1382975A4A15", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", matchCriteriaId: "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", matchCriteriaId: "574730B0-56C8-4A03-867B-1737148ED9B1", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", matchCriteriaId: "20EBC676-1B26-4A71-8326-0F892124290A", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", matchCriteriaId: "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", matchCriteriaId: "1379EF30-AF04-4F98-8328-52A631F24737", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", matchCriteriaId: "28E42A41-7965-456B-B0AF-9D3229CE4D4C", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", matchCriteriaId: "CB1A77D6-D3AD-481B-979C-8F778530B175", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", matchCriteriaId: "3A064B6B-A99B-4D8D-A62D-B00C7870BC30", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", matchCriteriaId: "40813417-A938-4F74-A419-8C5188A35486", vulnerable: true, }, { criteria: "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", matchCriteriaId: "7FC1BA1A-DF0E-4B15-86BA-24C60E546732", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", matchCriteriaId: "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", matchCriteriaId: "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", matchCriteriaId: "927EAB8B-EC3B-4B12-85B9-5517EBA49A30", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", matchCriteriaId: "2CEBF85C-736A-4E7D-956A-3E8210D4F70B", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*", matchCriteriaId: "4AE06B18-BFB5-4029-A05D-386CFBFBF683", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", matchCriteriaId: "CD647C15-A686-4C8F-A766-BC29404C0FED", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", matchCriteriaId: "45AB1622-1AED-4CD7-98F1-67779CDFC321", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*", matchCriteriaId: "48A1DCCD-208C-46D9-8E14-89592B49AB9A", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", matchCriteriaId: "89276D88-3B8D-4168-A2CD-0920297485F2", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", matchCriteriaId: "E020556B-693F-4963-BA43-3164AB50FA49", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB0D31FF-0812-42B8-B25E-03C35EC1B021", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", matchCriteriaId: "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", matchCriteriaId: "80F9DC32-5ADF-4430-B1A6-357D0B29DB78", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", matchCriteriaId: "8B82D4C4-7A65-409A-926F-33C054DCBFBA", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", matchCriteriaId: "746C3882-2A5B-4215-B259-EB1FD60C513D", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", matchCriteriaId: "CE535749-F4CE-4FFA-B23D-BF09C92481E5", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", matchCriteriaId: "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", matchCriteriaId: "06A03463-6B1D-4DBA-9E89-CAD5E899B98B", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", matchCriteriaId: "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", matchCriteriaId: "CCC5F6F5-4347-49D3-909A-27A3A96D36C9", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*", matchCriteriaId: "826F893F-7B06-43B5-8653-A8D9794C052E", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", matchCriteriaId: "56BA6B86-D3F4-4496-AE46-AC513C6560FA", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*", matchCriteriaId: "462CFD52-D3E2-4F7A-98AC-C589D2420556", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", matchCriteriaId: "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", matchCriteriaId: "2FDDC897-747F-44DD-9599-7266F9B5B7B1", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", matchCriteriaId: "62FC145A-D477-4C86-89E7-F70F52773801", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", matchCriteriaId: "06685D0E-A075-49A5-9EF4-34F0F795C8C6", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", matchCriteriaId: "52F0B735-8C49-4B08-950A-296C9CDE43CA", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", matchCriteriaId: "68CA098D-CBE4-4E62-9EC0-43E1B6098710", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", matchCriteriaId: "66F474D4-79B6-4525-983C-9A9011BD958B", vulnerable: false, }, { criteria: "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", matchCriteriaId: "8AA424D4-4DBF-4E8C-96B8-E37741B5403E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], descriptions: [ { lang: "en", value: "\nA Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nIn a remote access VPN scenario, if a \"tcp-encap-profile\" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions earlier than 20.4R3-S8;\n * 21.2 versions earlier than 21.2R3-S6;\n * 21.3 versions earlier than 21.3R3-S5;\n * 21.4 versions earlier than 21.4R3-S5;\n * 22.1 versions earlier than 22.1R3-S3;\n * 22.2 versions earlier than 22.2R3-S3;\n * 22.3 versions earlier than 22.3R3-S1;\n * 22.4 versions earlier than 22.4R2-S2, 22.4R3.\n\n\n\n\n\n\n", }, { lang: "es", value: "Una vulnerabilidad Double Free en el flow processing daemon (flowd) de Juniper Networks Junos OS en la serie SRX permite que un atacante no autenticado basado en red provoque una denegaciĂłn de servicio (DoS). En un escenario de VPN de acceso remoto, si se configura un \"tcp-encap-profile\" y se recibe una secuencia de paquetes especĂficos, se observará una falla fluida y un reinicio. Este problema afecta a Juniper Networks Junos OS en la serie SRX: * Todas las versiones anteriores a 20.4R3-S8; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S3; * Versiones 22.3 anteriores a 22.3R3-S1; * Versiones 22.4 anteriores a 22.4R2-S2, 22.4R3.", }, ], id: "CVE-2024-21606", lastModified: "2024-01-18T20:39:18.483", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "sirt@juniper.net", type: "Secondary", }, ], }, published: "2024-01-12T01:15:48.873", references: [ { source: "sirt@juniper.net", tags: [ "Vendor Advisory", ], url: "https://supportportal.juniper.net/JSA75747", }, { source: "sirt@juniper.net", tags: [ "Third Party Advisory", ], url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", }, ], sourceIdentifier: "sirt@juniper.net", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-415", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-415", }, ], source: "sirt@juniper.net", type: "Secondary", }, ], }, }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.