CVE-2022-22224Improper Check or Handling of Exceptional Conditions in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 71.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18

Description

An Improper Check or Handling of Exceptional Conditions vulnerability in the processing of a malformed OSPF TLV in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause the periodic packet management daemon (PPMD) process to go into an infinite loop, which in turn can cause protocols and functions reliant on PPMD such as OSPF neighbor reachability to be impacted, resulting in a sustained Denial of Service (DoS) condition. The DoS condition persists u

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.4R3-S3-EVO+1
CVEListV5juniper_networks/junos_osunspecified19.1R3-S9+8
NVDjuniper/junos< 19.1+9

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: PPMD goes into infinite loop upon receipt of malformed OSPF TLV2022-10-18
GHSA
GHSA-cfr4-7372-927c: An Improper Check or Handling of Exceptional Conditions vulnerability in the processing of a malformed OSPF TLV in Juniper Networks Junos OS and Junos2022-10-18

📋Vendor Advisories

1
Juniper
CVE-2022-22224: An Improper Check or Handling of Exceptional Conditions vulnerability in the processing of a malformed OSPF TLV in Juniper Networks Junos OS and Junos2022-10-18
CVE-2022-22224 — Networks Junos OS vulnerability | cvebase