{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-44198","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-09-26T19:30:32.350Z","datePublished":"2023-10-12T23:05:42.031Z","dateUpdated":"2024-09-18T14:41:11.841Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["SRX Series","MX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S5","status":"affected","version":"20.4","versionType":"semver"},{"lessThan":"21.1R3-S4","status":"affected","version":"21.1","versionType":"semver"},{"lessThan":"21.2R3-S4","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S3","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S2","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R2-S2, 22.1R3","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R2-S1, 22.2R3","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R1-S2, 22.3R2","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"20.4R1","status":"affected","version":"0","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX, and MX with SPC3 with:</p><code>user@host&gt; show security alg status | match sip</code><br><code>SIP : Enabled</code><br><p>Please verify on MX whether the following is configured:</p><code>[ services ... rule &lt;rule-name&gt; (term &lt;term-name&gt; ) from/match application/application-set &lt;name&gt; ]</code><br><p>where either</p><code>a. name = junos-sip or</code><br><p>an application or application-set refers to SIP:</p><code>b. [ applications application &lt;name&gt; application-protocol sip ] or</code><br><code>c. [ applications application-set &lt;name&gt; application junos-sip ]</code>\n\n"}],"value":"\nTo be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX, and MX with SPC3 with:\n\nuser@host> show security alg status | match sip\nSIP : Enabled\nPlease verify on MX whether the following is configured:\n\n[ services ... rule <rule-name> (term <term-name> ) from/match application/application-set <name> ]\nwhere either\n\na. name = junos-sip or\nan application or application-set refers to SIP:\n\nb. [ applications application <name> application-protocol sip ] or\nc. [ applications application-set <name> application junos-sip ]\n\n"}],"datePublic":"2023-10-11T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.</p><p>If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.</p><p>This issue affects Juniper Networks Junos OS on SRX Series and MX Series:</p><p></p><ul><li>20.4 versions prior to 20.4R3-S5;</li><li>21.1 versions prior to 21.1R3-S4;</li><li>21.2 versions prior to 21.2R3-S4;</li><li>21.3 versions prior to 21.3R3-S3;</li><li>21.4 versions prior to 21.4R3-S2;</li><li>22.1 versions prior to 22.1R2-S2, 22.1R3;</li><li>22.2 versions prior to 22.2R2-S1, 22.2R3;</li><li>22.3 versions prior to 22.3R1-S2, 22.3R2.</li></ul><p></p><p>This issue doesn't not affected releases prior to 20.4R1.</p>\n\n"}],"value":"\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.\n\nIf the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.\n\nThis issue affects Juniper Networks Junos OS on SRX Series and MX Series:\n\n\n\n  *  20.4 versions prior to 20.4R3-S5;\n  *  21.1 versions prior to 21.1R3-S4;\n  *  21.2 versions prior to 21.2R3-S4;\n  *  21.3 versions prior to 21.3R3-S3;\n  *  21.4 versions prior to 21.4R3-S2;\n  *  22.1 versions prior to 22.1R2-S2, 22.1R3;\n  *  22.2 versions prior to 22.2R2-S1, 22.2R3;\n  *  22.3 versions prior to 22.3R1-S2, 22.3R2.\n\n\n\n\nThis issue doesn't not affected releases prior to 20.4R1.\n\n\n\n"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2023-10-12T23:05:42.031Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA73164"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S5, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R2-S2, 22.1R3, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.</p>"}],"value":"The following software releases have been updated to resolve this specific issue: Junos OS 20.4R3-S5, 21.1R3-S4, 21.2R3-S4, 21.3R3-S3, 21.4R3-S2, 22.1R2-S2, 22.1R3, 22.2R2-S1, 22.2R3, 22.3R1-S2, 22.3R2, 22.4R1, and all subsequent releases.\n\n"}],"source":{"advisory":"JSA73164","defect":["1693379"],"discovery":"INTERNAL"},"timeline":[{"lang":"en","time":"2023-10-11T16:00:00.000Z","value":"Initial Publication"}],"title":"Junos OS: SRX Series and MX Series: SIP ALG doesn't drop specifically malformed retransmitted SIP packets","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>"}],"value":"There are no known workarounds for this issue.\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-av217"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:59:51.680Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA73164"}]},{"affected":[{"vendor":"juniper_networks","product":"junos_os","cpes":["cpe:2.3:o:juniper_networks:junos_os:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"20.4","status":"affected","lessThan":"20.4r3-s5","versionType":"semver"},{"version":"21.1","status":"affected","lessThan":"21.1r3-s4","versionType":"semver"},{"version":"21.2","status":"affected","lessThan":"21.2r3-s4","versionType":"semver"},{"version":"21.3","status":"affected","lessThan":"21.3r3-s3","versionType":"semver"},{"version":"21.4","status":"affected","lessThan":"21.4r3-s2","versionType":"semver"},{"version":"22.1","status":"affected","lessThan":"22.1r2-s2,22.1r3","versionType":"semver"},{"version":"22.2","status":"affected","lessThan":"22.2r2-s122.2r3","versionType":"semver"},{"version":"22.3","status":"affected","lessThan":"22.3r1-s2.22.3r2","versionType":"semver"},{"version":"0","status":"affected","lessThan":"20.4r1","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-18T14:36:59.623824Z","id":"CVE-2023-44198","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-18T14:41:11.841Z"}}]}}