CVE-2023-22417
HIGHJuniper Networks Junos OS - DoS
Title source: llmDescription
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.
References (1)
Scores
CVSS v3
7.5
EPSS
0.0044
EPSS Percentile
62.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-401
Status
published
Affected Products (50)
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
juniper/junos
... and 35 more
Timeline
Published
Jan 13, 2023
Tracked Since
Feb 18, 2026