CVE-2022-22238Improper Check for Unusual or Exceptional Conditions in Networks Junos OS

Severity
6.5MEDIUMNVD
CNA5.3
EPSS
0.1%
top 71.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When an incoming RESV message corresponding to a protected LSP is malformed it causes an incorrect internal state resulting in an rpd core. This issue affects: Juniper Networks Junos OS All versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 vers

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.2R3-S3-EVO+5
CVEListV5juniper_networks/junos_osunspecified19.2R3-S6+9
NVDjuniper/junos< 19.2+10

🔴Vulnerability Details

2
GHSA
GHSA-2qc3-77qp-3chq: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS E2022-10-18
CVEList
Junos OS and Junos OS Evolved: The rpd process will crash when a malformed incoming RESV message is processed2022-10-18

📋Vendor Advisories

1
Juniper
CVE-2022-22238: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS E2022-10-18
CVE-2022-22238 — Networks Junos OS vulnerability | cvebase