Denial of service in Junos Fusion



Published: 2022-01-17
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-22154
CWE-ID CWE-642
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Juniper Junos OS
Operating systems & Components / Operating system

Vendor

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) External Control of Critical State Data

EUVDB-ID: #VU59631

Risk: Low

CVSSv3.1: 4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22154

CWE-ID: CWE-642 - External Control of Critical State Data

Exploit availability: No

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insecure validation in the Junos Fusion setup of the satellite device. An attacker with physical access to device can make physical changes to the cabling of the device to cause a denial of service (DoS).

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Juniper Junos OS: before 19.2R3-S4, 18.4R3-S10, 19.1R3-S7, 19.3R1


CPE2.3 External links

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11262&cat=SIRT_1&actp=LIST

Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###