An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.
If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.
This issue affects Juniper Networks Junos OS on SRX Series and MX Series:
* 20.4 versions prior to 20.4R3-S5;
* 21.1 versions prior to 21.1R3-S4;
* 21.2 versions prior to 21.2R3-S4;
* 21.3 versions prior to 21.3R3-S3;
* 21.4 versions prior to 21.4R3-S2;
* 22.1 versions prior to 22.1R2-S2, 22.1R3;
* 22.2 versions prior to 22.2R2-S1, 22.2R3;
* 22.3 versions prior to 22.3R1-S2, 22.3R2.
This issue doesn't not affected releases prior to 20.4R1.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA73164 | Vendor Advisory |
https://supportportal.juniper.net/JSA73164 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-13 00:15
Updated : 2024-11-21 08:25
NVD link : CVE-2023-44198
Mitre link : CVE-2023-44198
CVE.ORG link : CVE-2023-44198
JSON object : View
Products Affected
juniper
- mx304
- srx550
- mx2008
- srx340
- srx5800
- srx380
- srx4700
- mx240
- mx2010
- mx960
- srx300
- srx4100
- srx1600
- srx4200
- srx345
- mx10008
- srx2300
- junos
- mx480
- mx2020
- srx5600
- mx10004
- srx4600
- srx4300
- srx320
- mx10003
- srx5400
- srx1500
- mx204
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions