Denial of service in Junos Fusion

Published: 2022-01-17
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-22154
Exploitation vector Local
Public exploit N/A
Vulnerable software
Juniper Junos OS
Operating systems & Components / Operating system


Security Bulletin

This security bulletin contains one low risk vulnerability.

1) External Control of Critical State Data

EUVDB-ID: #VU59631

Risk: Low

CVSSv3.1: 4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22154

CWE-ID: CWE-642 - External Control of Critical State Data

Exploit availability: No


The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insecure validation in the Junos Fusion setup of the satellite device. An attacker with physical access to device can make physical changes to the cabling of the device to cause a denial of service (DoS).


Install updates from vendor's website.

Vulnerable software versions

Juniper Junos OS: before 19.2R3-S4, 18.4R3-S10, 19.1R3-S7, 19.3R1

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.