CWE
372
Advisory Published
Updated

CVE-2023-36834: Junos OS: SRX 4600 and SRX 5000 Series: The receipt of specific genuine packets by SRXes configured for L2 transparency will cause a DoS

First published: Fri Jul 14 2023(Updated: )

An Incomplete Internal State Distinction vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series allows an adjacent attacker to cause a Denial of Service (DoS). If an SRX is configured in L2 transparent mode the receipt of a specific genuine packet can cause a single Packet Processing Engines (PPE) component of the PFE to run into a loop, which in turn will render the PPE unavailable. Each packet will cause one PPE to get into a loop, leading to a gradual performance degradation until all PPEs are unavailable and all traffic processing stops. To recover the affected FPC need to be restarted. This issue affects Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series: 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S7; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R1-S1, 22.3R2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=20.1-r1
Junos OS Evolved=20.1-r1-s1
Junos OS Evolved=20.1-r1-s2
Junos OS Evolved=20.1-r1-s3
Junos OS Evolved=20.1-r1-s4
Junos OS Evolved=20.1-r2
Junos OS Evolved=20.1-r2-s1
Junos OS Evolved=20.1-r2-s2
Junos OS Evolved=20.1-r3
Junos OS Evolved=20.1-r3-s1
Junos OS Evolved=20.1-r3-s2
Junos OS Evolved=20.1-r3-s3
Junos OS Evolved=20.1-r3-s4
Junos OS Evolved=20.1-r3-s5
Junos OS Evolved=20.2
Junos OS Evolved=20.2-r1
Junos OS Evolved=20.2-r1-s1
Junos OS Evolved=20.2-r1-s2
Junos OS Evolved=20.2-r1-s3
Junos OS Evolved=20.2-r2
Junos OS Evolved=20.2-r2-s1
Junos OS Evolved=20.2-r2-s2
Junos OS Evolved=20.2-r2-s3
Junos OS Evolved=20.2-r3
Junos OS Evolved=20.2-r3-s1
Junos OS Evolved=20.2-r3-s2
Junos OS Evolved=20.2-r3-s3
Junos OS Evolved=20.2-r3-s4
Junos OS Evolved=20.2-r3-s5
Junos OS Evolved=20.2-r3-s6
Junos OS Evolved=20.3-r1
Junos OS Evolved=20.3-r1-s1
Junos OS Evolved=20.3-r1-s2
Junos OS Evolved=20.3-r2
Junos OS Evolved=20.3-r2-s1
Junos OS Evolved=20.3-r3
Junos OS Evolved=20.3-r3-s1
Junos OS Evolved=20.3-r3-s2
Junos OS Evolved=20.3-r3-s3
Junos OS Evolved=20.3-r3-s4
Junos OS Evolved=20.3-r3-s5
Junos OS Evolved=20.3-r3-s6
Junos OS Evolved=20.4
Junos OS Evolved=20.4-r1
Junos OS Evolved=20.4-r1-s1
Junos OS Evolved=20.4-r2
Junos OS Evolved=20.4-r2-s1
Junos OS Evolved=20.4-r2-s2
Junos OS Evolved=20.4-r3
Junos OS Evolved=20.4-r3-s1
Junos OS Evolved=20.4-r3-s2
Junos OS Evolved=20.4-r3-s3
Junos OS Evolved=20.4-r3-s4
Junos OS Evolved=20.4-r3-s5
Junos OS Evolved=20.4-r3-s6
Junos OS Evolved=21.1
Junos OS Evolved=21.1-r1
Junos OS Evolved=21.1-r1-s1
Junos OS Evolved=21.1-r2
Junos OS Evolved=21.1-r2-s1
Junos OS Evolved=21.1-r2-s2
Junos OS Evolved=21.1-r3
Junos OS Evolved=21.1-r3-s1
Junos OS Evolved=21.1-r3-s2
Junos OS Evolved=21.1-r3-s3
Junos OS Evolved=21.1-r3-s4
Junos OS Evolved=21.2
Junos OS Evolved=21.2-r1
Junos OS Evolved=21.2-r1-s1
Junos OS Evolved=21.2-r1-s2
Junos OS Evolved=21.2-r2
Junos OS Evolved=21.2-r2-s1
Junos OS Evolved=21.2-r2-s2
Junos OS Evolved=21.2-r3
Junos OS Evolved=21.2-r3-s1
Junos OS Evolved=21.2-r3-s2
Junos OS Evolved=21.3
Junos OS Evolved=21.3-r1
Junos OS Evolved=21.3-r1-s1
Junos OS Evolved=21.3-r1-s2
Junos OS Evolved=21.3-r2
Junos OS Evolved=21.3-r2-s1
Junos OS Evolved=21.3-r2-s2
Junos OS Evolved=21.3-r3
Junos OS Evolved=21.3-r3-s1
Junos OS Evolved=21.3-r3-s2
Junos OS Evolved=21.4
Junos OS Evolved=21.4-r1
Junos OS Evolved=21.4-r1-s1
Junos OS Evolved=21.4-r1-s2
Junos OS Evolved=21.4-r2
Junos OS Evolved=21.4-r2-s1
Junos OS Evolved=21.4-r2-s2
Junos OS Evolved=21.4-r3
Juniper SRX4600
Juniper SRX5400
Juniper SRX5600
Juniper SRX5800

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S7, 20.4R3-S7, 21.1R3-S5, 21.2R3-S3, 21.3R3-S3, 21.4R3-S1, 22.1R3, 22.2R2, 22.3R1-S1, 22.3R2, 22.4R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-36834?

    CVE-2023-36834 is classified as a Denial of Service (DoS) vulnerability.

  • How can I mitigate the effects of CVE-2023-36834?

    To mitigate CVE-2023-36834, configure your SRX devices to avoid L2 transparent mode.

  • Which Juniper devices are affected by CVE-2023-36834?

    CVE-2023-36834 affects Juniper Networks SRX 4600 and SRX 5000 Series running specific versions of Junos OS.

  • Is there a patch available for CVE-2023-36834?

    Juniper Networks has made available a patch for CVE-2023-36834 through their support portal.

  • Can CVE-2023-36834 be exploited remotely?

    CVE-2023-36834 can be exploited by an adjacent attacker.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203