First published: Fri Jul 11 2014(Updated: )
Juniper Junos 12.1X46 before 12.1X46-D20 and 12.1X47 before 12.1X47-D10 on SRX Series devices allows remote attackers to cause a denial of service (flowd crash) via a crafted SIP packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.1x46 | |
Juniper JUNOS | =12.1x47 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3815 is classified as a high severity vulnerability due to its potential to cause denial of service on affected devices.
To mitigate CVE-2014-3815, update to the recommended versions of Junos at or above 12.1X46-D20 or 12.1X47-D10.
CVE-2014-3815 affects Juniper SRX Series devices running specific versions of Junos, primarily 12.1X46 and 12.1X47.
Exploitation of CVE-2014-3815 allows remote attackers to crash flowd processes, leading to denial of service on the device.
There are no known workarounds for CVE-2014-3815; patching is the recommended mitigation strategy.