First published: Fri Jul 11 2014(Updated: )
Juniper Junos 11.4 before 11.4R8, 12.1 before 12.1R5, 12.1X44 before 12.1X44-D20, 12.1X45 before 12.1X45-D15, 12.1X46 before 12.1X46-D10, and 12.1X47 before 12.1X47-D10 on SRX Series devices, allows remote attackers to cause a denial of service (flowd crash) via a malformed packet, related to translating IPv6 to IPv4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1 | |
Juniper JUNOS | =12.1x44 | |
Juniper JUNOS | =12.1x45 | |
Juniper JUNOS | =12.1x46 | |
Juniper JUNOS | =12.1x47 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3822 is classified as a denial of service vulnerability, with a potential high impact on affected systems.
To mitigate CVE-2014-3822, upgrade Junos to one of the patched versions, specifically 11.4R8 or later for 11.4, or 12.1R5 or later for 12.1.
CVE-2014-3822 affects multiple versions of Junos OS, particularly on SRX Series devices including models like the SRX100 and SRX550.
Yes, CVE-2014-3822 allows remote attackers to exploit the vulnerability by sending malformed packets.
Exploitation of CVE-2014-3822 may cause the affected device to crash, leading to service interruption.