First published: Fri Jul 14 2023(Updated: )
An Incomplete Internal State Distinction vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series allows an adjacent attacker to cause a Denial of Service (DoS). If an SRX is configured in L2 transparent mode the receipt of a specific genuine packet can cause a single Packet Processing Engines (PPE) component of the PFE to run into a loop, which in turn will render the PPE unavailable. Each packet will cause one PPE to get into a loop, leading to a gradual performance degradation until all PPEs are unavailable and all traffic processing stops. To recover the affected FPC need to be restarted. This issue affects Juniper Networks Junos OS on SRX 4600 and SRX 5000 Series: 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S7; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2; 22.3 versions prior to 22.3R1-S1, 22.3R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =20.1-r1 | |
Junos OS Evolved | =20.1-r1-s1 | |
Junos OS Evolved | =20.1-r1-s2 | |
Junos OS Evolved | =20.1-r1-s3 | |
Junos OS Evolved | =20.1-r1-s4 | |
Junos OS Evolved | =20.1-r2 | |
Junos OS Evolved | =20.1-r2-s1 | |
Junos OS Evolved | =20.1-r2-s2 | |
Junos OS Evolved | =20.1-r3 | |
Junos OS Evolved | =20.1-r3-s1 | |
Junos OS Evolved | =20.1-r3-s2 | |
Junos OS Evolved | =20.1-r3-s3 | |
Junos OS Evolved | =20.1-r3-s4 | |
Junos OS Evolved | =20.1-r3-s5 | |
Junos OS Evolved | =20.2 | |
Junos OS Evolved | =20.2-r1 | |
Junos OS Evolved | =20.2-r1-s1 | |
Junos OS Evolved | =20.2-r1-s2 | |
Junos OS Evolved | =20.2-r1-s3 | |
Junos OS Evolved | =20.2-r2 | |
Junos OS Evolved | =20.2-r2-s1 | |
Junos OS Evolved | =20.2-r2-s2 | |
Junos OS Evolved | =20.2-r2-s3 | |
Junos OS Evolved | =20.2-r3 | |
Junos OS Evolved | =20.2-r3-s1 | |
Junos OS Evolved | =20.2-r3-s2 | |
Junos OS Evolved | =20.2-r3-s3 | |
Junos OS Evolved | =20.2-r3-s4 | |
Junos OS Evolved | =20.2-r3-s5 | |
Junos OS Evolved | =20.2-r3-s6 | |
Junos OS Evolved | =20.3-r1 | |
Junos OS Evolved | =20.3-r1-s1 | |
Junos OS Evolved | =20.3-r1-s2 | |
Junos OS Evolved | =20.3-r2 | |
Junos OS Evolved | =20.3-r2-s1 | |
Junos OS Evolved | =20.3-r3 | |
Junos OS Evolved | =20.3-r3-s1 | |
Junos OS Evolved | =20.3-r3-s2 | |
Junos OS Evolved | =20.3-r3-s3 | |
Junos OS Evolved | =20.3-r3-s4 | |
Junos OS Evolved | =20.3-r3-s5 | |
Junos OS Evolved | =20.3-r3-s6 | |
Junos OS Evolved | =20.4 | |
Junos OS Evolved | =20.4-r1 | |
Junos OS Evolved | =20.4-r1-s1 | |
Junos OS Evolved | =20.4-r2 | |
Junos OS Evolved | =20.4-r2-s1 | |
Junos OS Evolved | =20.4-r2-s2 | |
Junos OS Evolved | =20.4-r3 | |
Junos OS Evolved | =20.4-r3-s1 | |
Junos OS Evolved | =20.4-r3-s2 | |
Junos OS Evolved | =20.4-r3-s3 | |
Junos OS Evolved | =20.4-r3-s4 | |
Junos OS Evolved | =20.4-r3-s5 | |
Junos OS Evolved | =20.4-r3-s6 | |
Junos OS Evolved | =21.1 | |
Junos OS Evolved | =21.1-r1 | |
Junos OS Evolved | =21.1-r1-s1 | |
Junos OS Evolved | =21.1-r2 | |
Junos OS Evolved | =21.1-r2-s1 | |
Junos OS Evolved | =21.1-r2-s2 | |
Junos OS Evolved | =21.1-r3 | |
Junos OS Evolved | =21.1-r3-s1 | |
Junos OS Evolved | =21.1-r3-s2 | |
Junos OS Evolved | =21.1-r3-s3 | |
Junos OS Evolved | =21.1-r3-s4 | |
Junos OS Evolved | =21.2 | |
Junos OS Evolved | =21.2-r1 | |
Junos OS Evolved | =21.2-r1-s1 | |
Junos OS Evolved | =21.2-r1-s2 | |
Junos OS Evolved | =21.2-r2 | |
Junos OS Evolved | =21.2-r2-s1 | |
Junos OS Evolved | =21.2-r2-s2 | |
Junos OS Evolved | =21.2-r3 | |
Junos OS Evolved | =21.2-r3-s1 | |
Junos OS Evolved | =21.2-r3-s2 | |
Junos OS Evolved | =21.3 | |
Junos OS Evolved | =21.3-r1 | |
Junos OS Evolved | =21.3-r1-s1 | |
Junos OS Evolved | =21.3-r1-s2 | |
Junos OS Evolved | =21.3-r2 | |
Junos OS Evolved | =21.3-r2-s1 | |
Junos OS Evolved | =21.3-r2-s2 | |
Junos OS Evolved | =21.3-r3 | |
Junos OS Evolved | =21.3-r3-s1 | |
Junos OS Evolved | =21.3-r3-s2 | |
Junos OS Evolved | =21.4 | |
Junos OS Evolved | =21.4-r1 | |
Junos OS Evolved | =21.4-r1-s1 | |
Junos OS Evolved | =21.4-r1-s2 | |
Junos OS Evolved | =21.4-r2 | |
Junos OS Evolved | =21.4-r2-s1 | |
Junos OS Evolved | =21.4-r2-s2 | |
Junos OS Evolved | =21.4-r3 | |
Juniper SRX4600 | ||
Juniper SRX5400 | ||
Juniper SRX5600 | ||
Juniper SRX5800 |
The following software releases have been updated to resolve this specific issue: Junos OS 20.2R3-S7, 20.4R3-S7, 21.1R3-S5, 21.2R3-S3, 21.3R3-S3, 21.4R3-S1, 22.1R3, 22.2R2, 22.3R1-S1, 22.3R2, 22.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36834 is classified as a Denial of Service (DoS) vulnerability.
To mitigate CVE-2023-36834, configure your SRX devices to avoid L2 transparent mode.
CVE-2023-36834 affects Juniper Networks SRX 4600 and SRX 5000 Series running specific versions of Junos OS.
Juniper Networks has made available a patch for CVE-2023-36834 through their support portal.
CVE-2023-36834 can be exploited by an adjacent attacker.