First published: Tue Oct 14 2014(Updated: )
The Juniper SRX Series devices with Junos 11.4 before 11.4R12-S4, 12.1X44 before 12.1X44-D40, 12.1X45 before 12.1X45-D30, 12.1X46 before 12.1X46-D25, and 12.1X47 before 12.1X47-D10, when an Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =11.4 | |
Juniper JUNOS | =12.1 | |
Juniper JUNOS | =12.1x44 | |
Juniper JUNOS | =12.1x45 | |
Juniper JUNOS | =12.1x46 | |
Juniper JUNOS | =12.1x47 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX3400 | ||
Juniper SRX3600 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3825 has a high severity rating as it allows remote attackers to cause a denial of service.
To fix CVE-2014-3825, update the Junos software to the recommended versions released after the vulnerable versions mentioned in the CVE report.
CVE-2014-3825 affects various Juniper SRX Series devices running specific versions of Junos software, including 11.4 and 12.1 series.
If CVE-2014-3825 is not addressed, your Juniper SRX devices may experience crashes and potential service disruptions due to denial of service attacks.
CVE-2014-3825 was reported in 2014, highlighting a significant vulnerability that impacts network security.