7.5
CVE-2022-22197
- EPSS 0.79%
- Published 14.04.2022 16:15:08
- Last modified 21.11.2024 06:46:22
- Source sirt@juniper.net
- Teams watchlist Login
- Open Login
An Operation on a Resource after Expiration or Release vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker with an established BGP session to cause a Denial of Service (DoS). This issue occurs when proxy-generate route-target filtering is enabled, and certain proxy-route add and delete events are happening. This issue affects: Juniper Networks Junos OS All versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO.
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version < 20.1
Juniper ≫ Junos Os Evolved Version20.1 Updater1
Juniper ≫ Junos Os Evolved Version20.1 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater2
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s2
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s3
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s4
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s5
Juniper ≫ Junos Os Evolved Version20.2 Updater1
Juniper ≫ Junos Os Evolved Version20.2 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.2 Updater2
Juniper ≫ Junos Os Evolved Version20.2 Updater2-s1
Juniper ≫ Junos Os Evolved Version20.3 Updater1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s2
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.79% | 0.726 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:N/A:P
|
sirt@juniper.net | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-672 Operation on a Resource after Expiration or Release
The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.