QID 44153

Date Published: 2024-01-24

QID 44153: Juniper Network Operating System (Junos OS) SRX Series Denial of Service (DoS) Vulnerability (CVE-2024-21606)

A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
In a remote access VPN scenario, if a "tcp-encap-profile" is configured and a sequence of specific packets is received, a flowd crash and restart will be observed.

These issues affects Juniper Networks: Affected platforms: SRX Series.
Junos OS:
All versions earlier than 20.4R3-S8 on SRX Series
21.2 versions earlier than 21.2R3-S6 on SRX Series
21.3 versions earlier than 21.3R3-S5 on SRX Series
21.4 versions earlier than 21.4R3-S5 on SRX Series
22.1 versions earlier than 22.1R3-S3 on SRX Series
22.2 versions earlier than 22.2R3-S3 on SRX Series
22.3 versions earlier than 22.3R3-S1 on SRX Series
22.4 versions earlier than 22.4R2-S2, 22.4R3 on SRX Series.

QID detection logic: (Authenticated)

It checks for vulnerable Junos OS version.

Successful exploitation of this vulnerability by the attacker will create a sustained Denial of Service (DoS) condition.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Vendor has released patch addressing the vulnerabilities, for more information please refer JSA75729

    CVEs related to QID 44153

    Software Advisories
    Advisory ID Software Component Link
    CVE-2024-21606 URL Logo supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606?language=en_US