Resource exhaustion in Juniper Junos OS



Published: 2022-04-13
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-22191
CWE-ID CWE-400
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Juniper Junos OS
Operating systems & Components / Operating system

Vendor Juniper Networks, Inc.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Resource exhaustion

EUVDB-ID: #VU82466

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22191

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A Denial of Service (DoS) vulnerability in the processing of a flood of specific ARP traffic in Juniper Networks Junos OS on the EX4300 switch, sent from the local broadcast domain, may allow an unauthenticated network-adjacent attacker to trigger a PFEMAN watchdog timeout, causing the Packet Forwarding Engine (PFE) to crash and restart.

After the restart, transit traffic will be temporarily interrupted until the PFE is reprogrammed.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Juniper Junos OS: 15.1 - 21.3R1-S1

External links

http://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-EX4300-PFE-Denial-of-Service-DoS-upon-receipt-of-a-flood-of-specific-ARP-traffic-CVE-2022-22191


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###