CVE-2024-21616 — Improper Validation of Syntactic Correctness of Input in Networks Junos OS
Severity
7.5HIGHNVD
EPSS
0.2%
top 57.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 12
Description
An Improper Validation of Syntactic Correctness of Input vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).
On all Junos OS MX Series and SRX Series platforms, when SIP ALG is enabled, and a specific SIP packet is received and processed, NAT IP allocation fails for genuine traffic, which causes Denial of Service (DoS). Continuous receipt of this specific SIP ALG packet will cause a sust…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
2CVEList▶
Junos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allocation to fail↗2024-01-12
GHSA▶
GHSA-355p-vp22-pp2v: An Improper Validation of Syntactic Correctness of Input vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauth↗2024-01-12
📋Vendor Advisories
1Juniper▶
CVE-2024-21616:
An Improper Validation of Syntactic Correctness of Input vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unaut↗2024-01-12