7.5
CVE-2022-22192
- EPSS 0.19%
- Published 18.10.2022 03:15:09
- Last modified 21.11.2024 06:46:21
- Source sirt@juniper.net
- Teams watchlist Login
- Open Login
An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined to the ports for BGP, LDP and MSDP can trigger this. This issue only affects PTX10004, PTX10008, PTX10016. No other PTX Series devices or other platforms are affected. This issue affects Juniper Networks Junos OS Evolved: 20.4-EVO versions prior to 20.4R3-S4-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 20.4R1-EVO.
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version20.4 Updater1
Juniper ≫ Junos Os Evolved Version20.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.4 Updater1-s2
Juniper ≫ Junos Os Evolved Version20.4 Updater2
Juniper ≫ Junos Os Evolved Version20.4 Updater2-s1
Juniper ≫ Junos Os Evolved Version20.4 Updater2-s2
Juniper ≫ Junos Os Evolved Version20.4 Updater2-s3
Juniper ≫ Junos Os Evolved Version20.4 Updater3
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s1
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s2
Juniper ≫ Junos Os Evolved Version20.4 Updater3-s3
Juniper ≫ Junos Os Evolved Version21.3 Updater1
Juniper ≫ Junos Os Evolved Version21.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version21.3 Updater2
Juniper ≫ Junos Os Evolved Version21.3 Updater2-s1
Juniper ≫ Junos Os Evolved Version21.3 Updater2-s2
Juniper ≫ Junos Os Evolved Version21.4 Update-
Juniper ≫ Junos Os Evolved Version21.4 Updater1
Juniper ≫ Junos Os Evolved Version21.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version21.4 Updater2
Juniper ≫ Junos Os Evolved Version21.4 Updater2-s1
Juniper ≫ Junos Os Evolved Version21.4 Updater2-s2
Juniper ≫ Junos Os Evolved Version22.1 Updater1
Juniper ≫ Junos Os Evolved Version22.1 Updater1-s1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.19% | 0.412 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
sirt@juniper.net | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-1286 Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.