SB2024011077 - Improper validation of syntactic correctness of input in Juniper Junos OS
Published: January 10, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper validation of syntactic correctness of input (CVE-ID: CVE-2024-21616)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper validation of syntactic correctness of input error in Packet Forwarding Engine (PFE). A remote non-authenticated attacker can cause Denial of Service (DoS).
On all Junos OS MX Series and SRX Series platforms, when SIP ALG is enabled, and a specific SIP packet is received and processed, NAT IP allocation fails for genuine traffic, which causes Denial of Service (DoS).
Continuous receipt of this specific SIP ALG packet will cause a sustained DoS condition.
Remediation
Install update from vendor's website.