Discover the critical double free vulnerability (CVE-2020-1647) on Juniper Networks SRX Series with ICAP redirect service enabled, potentially leading to DoS or Remote Code Execution (RCE). Learn about the impact, affected versions, and mitigation steps.
On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to the processing of a specific HTTP message. Learn about the impact, technical details, and mitigation steps related to this CVE.
Understanding CVE-2020-1647
This CVE pertains to a vulnerability on Juniper Networks SRX Series when the ICAP redirect service is active.
What is CVE-2020-1647?
CVE-2020-1647 addresses a double free vulnerability on Juniper Networks SRX Series. The issue arises when processing a specific HTTP message with the ICAP redirect service enabled, potentially leading to DoS or RCE.
The Impact of CVE-2020-1647
Technical Details of CVE-2020-1647
This section covers vulnerability description, affected systems and versions, and the exploitation mechanism.
Vulnerability Description
The vulnerability stems from processing specific HTTP messages with the ICAP redirect service enabled, resulting in a double free issue that can lead to DoS or RCE.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by processing a specific HTTP message with the ICAP redirect service enabled, potentially resulting in a DoS or RCE.
Mitigation and Prevention
Take immediate steps and adopt long-term security practices to mitigate the risks associated with CVE-2020-1647.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply the following software releases or later versions to address the issue: 18.1R3-S9, 18.2R3-S3, 18.3R2-S4, 18.3R3-S1, 18.4R2-S5, 18.4R3, 19.1R2, 19.2R1-S2, 19.2R2, 19.3R2, 19.4R1, and subsequent releases.