CVE-2019-0051Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.2%
top 53.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9
Latest updateMay 24

Description

SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients protected by the SRX device must initiate a connection to the malicious server. This issue affects: Juniper Networks Junos OS on SRX5000 Series: 12.3X48 versions prior to 12.3X48-D85; 15.1X49 versions prior to 15.1X49-D

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os12.3X4812.3X48-D85+8
NVDjuniper/junos9 versions+8

🔴Vulnerability Details

1
GHSA
GHSA-prp9-q697-6cf2: SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd da2022-05-24

📋Vendor Advisories

1
Juniper
CVE-2019-0051: SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd da2019-10-09
CVE-2019-0051 — Juniper Networks Junos OS vulnerability | cvebase