CVE-2022-22179Improper Input Validation in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 80.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 19
Latest updateJan 20

Description

A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). In a scenario where DHCP relay or local server is configured the problem can be triggered if a DHCPv4 packet with specific options is received leading to a corruption of the options read from the packet. This corruption can then lead to jdh

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os17.4R117.4*+12
NVDjuniper/junos16 versions+15

🔴Vulnerability Details

2
GHSA
GHSA-x9v8-cw49-c7pf: A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS2022-01-20
CVEList
Junos OS: jdhcpd crashes upon receiving a specific DHCP packet2022-01-19

📋Vendor Advisories

1
Juniper
CVE-2022-22179: A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS2022-01-19
CVE-2022-22179 — Improper Input Validation | cvebase