CVSS Score of 10 (low)


Published Jul 14, 2023
Updated: Jul 26, 2023
CWE ID 703


CVE-2023-36831 is an Improper Check or Handling of Exceptional Conditions vulnerability in the UTM Web-Filtering feature of Juniper Networks Junos OS on SRX Series. This vulnerability causes a jbuf memory leak when accessing certain websites, leading to a Denial of Service (DoS) condition. The affected products include 22.2 versions prior to 22.2R3, 22.3 versions prior to 22.3R2-S1 and 22.3R3, and 22.4 versions prior to 22.4R1-S2 and 22.4R2. The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations, while other products and configurations are not affected by this vulnerability. Rebooting the system is required for service restoration. This vulnerability has a high severity rating with a base score of 7.5 according to CVSS version 3.1, posing a potential danger of service disruption for organizations using the affected Junos OS versions on their SRX Series devices.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-36831 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options