Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-28985— SRX Series and MX Series: An FPC core is observed when IDP is enabled on the device and a specific malformed SSL packet is received

CVSS 7.5 · High EPSS 0.18% · P40
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-28985

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
SRX Series and MX Series: An FPC core is observed when IDP is enabled on the device and a specific malformed SSL packet is received
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition. On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core. This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598. In order to identify the current SigPack version, following command can be used: user@junos# show security idp security-package-version
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1286
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks SRX Series 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks SRX Series是美国瞻博网络(Juniper Networks)公司的一套SRX系列服务网关设备。 Juniper Networks SRX Series存在安全漏洞,该漏洞源于入侵检测和防御 (IDP) 中存在输入语法正确性验证不当,允许未经身份验证的网络攻击者造成拒绝服务 (DoS)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS unspecified ~ SigPack 3598 -

II. Public POCs for CVE-2023-28985

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-28985

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2023-07-14 · 12 CVEs total

CVE-2023-368357.5 HIGHJunos OS: QFX10000 Series: All traffic will be dropped after a specific valid IP packet ha
CVE-2023-368327.5 HIGHJunos OS: MX Series: PFE crash upon receipt of specific packet destined to an AMS interfac
CVE-2023-368317.5 HIGHJunos OS: SRX Series: jbuf memory leak when SSL Proxy and UTM Web-Filtering is applied
CVE-2023-368506.5 MEDIUMJunos OS: MX Series: An MPC will crash upon receipt of a malformed CFM packet.
CVE-2023-368496.5 MEDIUMJunos OS and Junos OS Evolved: The l2cpd will crash when a malformed LLDP packet is receiv
CVE-2023-368486.5 MEDIUMJunos OS: MX Series: The FPC will crash on receiving a malformed CFM packet
CVE-2023-368346.5 MEDIUMJunos OS: SRX 4600 and SRX 5000 Series: The receipt of specific genuine packets by SRXes c
CVE-2023-368336.5 MEDIUMJunos OS Evolved: PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202: The af
CVE-2023-368405.5 MEDIUMJunos OS and Junos OS Evolved: An rpd crash occurs when a specific L2VPN command is run
CVE-2023-368385.5 MEDIUMJunos OS: SRX Series: A flowd core occurs when running a low privileged CLI command
CVE-2023-368364.7 MEDIUMJunos OS and Junos OS Evolved: In a MoFRR scenario an rpd core may be observed when a low

IV. Related Vulnerabilities

V. Comments for CVE-2023-28985

No comments yet


Leave a comment