CVE-2023-36831Improper Check or Handling of Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.2%
top 53.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 14

Description

An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. Service restoration is only possible by rebooting the system. The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations. Other products, platforms, and configurations are no

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os22.222.2R3+2
NVDjuniper/junos22.2, 22.3, 22.4+2

🔴Vulnerability Details

2
GHSA
GHSA-g6m3-8xg2-qjhj: An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks2023-07-14
CVEList
Junos OS: SRX Series: jbuf memory leak when SSL Proxy and UTM Web-Filtering is applied2023-07-14

📋Vendor Advisories

1
Juniper
CVE-2023-36831: An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks2023-07-14
CVE-2023-36831 — Networks Junos OS vulnerability | cvebase