Vulnerability Details CVE-2023-22417
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S8, 19.4R3-S10; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 46.1%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-22417
-
cpe:2.3:h:juniper:srx100:-
-
cpe:2.3:h:juniper:srx110:-
-
cpe:2.3:h:juniper:srx1400:-
-
cpe:2.3:h:juniper:srx1500:-
-
cpe:2.3:h:juniper:srx210:-
-
cpe:2.3:h:juniper:srx220:-
-
cpe:2.3:h:juniper:srx240:-
-
cpe:2.3:h:juniper:srx240h2:-
-
cpe:2.3:h:juniper:srx240m:-
-
cpe:2.3:h:juniper:srx300:-
-
cpe:2.3:h:juniper:srx320:-
-
cpe:2.3:h:juniper:srx3400:-
-
cpe:2.3:h:juniper:srx340:-
-
cpe:2.3:h:juniper:srx345:-
-
cpe:2.3:h:juniper:srx3600:-
-
cpe:2.3:h:juniper:srx380:-
-
cpe:2.3:h:juniper:srx4000:-
-
cpe:2.3:h:juniper:srx4100:-
-
cpe:2.3:h:juniper:srx4200:-
-
cpe:2.3:h:juniper:srx4600:-
-
cpe:2.3:h:juniper:srx5000:-
-
cpe:2.3:h:juniper:srx5400:-
-
cpe:2.3:h:juniper:srx550:-
-
cpe:2.3:h:juniper:srx550_hm:-
-
cpe:2.3:h:juniper:srx550m:-
-
cpe:2.3:h:juniper:srx5600:-
-
cpe:2.3:h:juniper:srx5800:-
-
cpe:2.3:h:juniper:srx650:-
-
cpe:2.3:o:juniper:junos:19.3
-
cpe:2.3:o:juniper:junos:19.4
-
cpe:2.3:o:juniper:junos:20.2
-
cpe:2.3:o:juniper:junos:20.3
-
cpe:2.3:o:juniper:junos:20.4
-
cpe:2.3:o:juniper:junos:21.1
-
cpe:2.3:o:juniper:junos:21.2
-
cpe:2.3:o:juniper:junos:21.3
-
cpe:2.3:o:juniper:junos:21.4