CVE-2023-44198

An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.

If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.

This issue affects Juniper Networks Junos OS on SRX Series and MX Series:



  *  20.4 versions prior to 20.4R3-S5;
  *  21.1 versions prior to 21.1R3-S4;
  *  21.2 versions prior to 21.2R3-S4;
  *  21.3 versions prior to 21.3R3-S3;
  *  21.4 versions prior to 21.4R3-S2;
  *  22.1 versions prior to 22.1R2-S2, 22.1R3;
  *  22.2 versions prior to 22.2R2-S1, 22.2R3;
  *  22.3 versions prior to 22.3R1-S2, 22.3R2.




This issue doesn't not affected releases prior to 20.4R1.



ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
juniperCNA
5.8 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
juniper_networksjunos_os
20.4r3-s5 <
𝑥
< 20.4r3-s5
juniper_networksjunos_os
21.1r3-s4 <
𝑥
< 21.1r3-s4
juniper_networksjunos_os
21.2r3-s4 <
𝑥
< 21.2r3-s4
juniper_networksjunos_os
21.3r3-s3 <
𝑥
< 21.3r3-s3
juniper_networksjunos_os
21.4r3-s2 <
𝑥
< 21.4r3-s2
juniper_networksjunos_os
22.1r2-s2,22.1r3 <
𝑥
< 22.1r2-s2,22.1r3
juniper_networksjunos_os
22.2r2-s122.2r3 <
𝑥
< 22.2r2-s122.2r3
juniper_networksjunos_os
22.3r1-s2.22.3r2 <
𝑥
< 22.3r1-s2.22.3r2
juniper_networksjunos_os
𝑥
< 20.4r1
juniperjunos
𝑥
< 20.4
juniperjunos
20.4
juniperjunos
20.4:r1
juniperjunos
20.4:r1-s1
juniperjunos
20.4:r2
juniperjunos
20.4:r2-s1
juniperjunos
20.4:r2-s2
juniperjunos
20.4:r3
juniperjunos
20.4:r3-s1
juniperjunos
20.4:r3-s2
juniperjunos
20.4:r3-s3
juniperjunos
20.4:r3-s4
juniperjunos
21.1
juniperjunos
21.1:r1
juniperjunos
21.1:r1-s1
juniperjunos
21.1:r2
juniperjunos
21.1:r2-s1
juniperjunos
21.1:r2-s2
juniperjunos
21.1:r3
juniperjunos
21.1:r3-s1
juniperjunos
21.1:r3-s2
juniperjunos
21.1:r3-s3
juniperjunos
21.2
juniperjunos
21.2:r1
juniperjunos
21.2:r1-s1
juniperjunos
21.2:r1-s2
juniperjunos
21.2:r2
juniperjunos
21.2:r2-s1
juniperjunos
21.2:r2-s2
juniperjunos
21.2:r3
juniperjunos
21.2:r3-s1
juniperjunos
21.2:r3-s2
juniperjunos
21.2:r3-s3
juniperjunos
21.3
juniperjunos
21.3:r1
juniperjunos
21.3:r1-s1
juniperjunos
21.3:r1-s2
juniperjunos
21.3:r2
juniperjunos
21.3:r2-s1
juniperjunos
21.3:r2-s2
juniperjunos
21.3:r3
juniperjunos
21.3:r3-s1
juniperjunos
21.3:r3-s2
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r2-s1
juniperjunos
21.4:r2-s2
juniperjunos
21.4:r3
juniperjunos
21.4:r3-s1
juniperjunos
22.1
juniperjunos
22.1:r1
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.1:r2
juniperjunos
22.1:r2-s1
juniperjunos
22.1:r3
juniperjunos
22.1:r3-s1
juniperjunos
22.2
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
juniperjunos
22.2:r2
juniperjunos
22.2:r2-s1
juniperjunos
22.3
juniperjunos
22.3:r1
juniperjunos
22.3:r1-s1
juniperjunos
22.3:r1-s2
𝑥
= Vulnerable software versions