SB2023011178 - Improper input validation in Juniper Junos OS



SB2023011178 - Improper input validation in Juniper Junos OS

Published: January 11, 2023

Security Bulletin ID SB2023011178
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper input validation (CVE-ID: CVE-2023-22394)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An Improper Handling of Unexpected Data Type vulnerability when handling SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS).  This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is enabled.


Remediation

Install update from vendor's website.