CVE-2022-22230Improper Input Validation in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 80.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18

Description

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause DoS (Denial of Service). If another router generates more than one specific valid OSPFv3 LSA then rpd will crash while processing these LSAs. This issue only affects systems configured with OSPFv3, while OSPFv2 is not affected. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S6; 19.3 vers

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.4R3-S5-EVO+6
CVEListV5juniper_networks/junos_os19.219.2R3-S6+10
NVDjuniper/junos_os_evolved15 versions+14
NVDjuniper/junos11 versions+10

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: RPD crash upon receipt of specific OSPFv3 LSAs2022-10-18
GHSA
GHSA-87vf-3522-r582: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent u2022-10-18

📋Vendor Advisories

1
Juniper
CVE-2022-22230: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent u2022-10-18
CVE-2022-22230 — Improper Input Validation | cvebase