CVE-2022-22231Unchecked Return Value to NULL Pointer Dereference in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 36.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18

Description

An Unchecked Return Value to NULL Pointer Dereference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series if Unified Threat Management (UTM) Enhanced Content Filtering (CF) and AntiVirus (AV) are enabled together and the system processes specific valid transit traffic the Packet Forwarding Engine (PFE) will crash and restart. This issue affects Juniper Networks Junos OS 21

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os21.421.4R1-S2, 21.4R2
NVDjuniper/junos21.4

🔴Vulnerability Details

2
CVEList
SRX Series: If UTM Enhanced Content Filtering and AntiVirus are enabled, and specific traffic is processed the PFE will crash2022-10-18
GHSA
GHSA-cxvj-jx5h-9xf2: An Unchecked Return Value to NULL Pointer Dereference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthent2022-10-18

📋Vendor Advisories

1
Juniper
CVE-2022-22231: An Unchecked Return Value to NULL Pointer Dereference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthent2022-10-18
CVE-2022-22231 — Networks Junos OS vulnerability | cvebase