CVE-2022-22218Improper Check for Unusual or Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.2%
top 53.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18

Description

On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All ve

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_osunspecified19.1R3-S9+10
NVDjuniper/junos< 19.1+11

🔴Vulnerability Details

2
CVEList
Junos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment2022-10-18
GHSA
GHSA-w8g3-qr9q-hvhv: On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-en2022-10-18

📋Vendor Advisories

1
Juniper
CVE-2022-22218: On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-en2022-10-18
CVE-2022-22218 — Networks Junos OS vulnerability | cvebase