Denial of service in Junos OS Evolved IPv6 handling



Published: 2022-10-14
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-22227
CWE-ID CWE-755
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Junos OS Evolved
Operating systems & Components / Operating system

Vendor Juniper Networks, Inc.

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper handling of exceptional conditions

EUVDB-ID: #VU68328

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-22227

CWE-ID: CWE-755 - Improper Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of errors in the Packet Forwarding Engine (PFE) when processing IPv6 transit traffic. A remote attacker can send specially crafted input through the device and cause increased CPU utilization, which can result in denial of service (DoS).

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Junos OS Evolved: 21.1 - 22.1-EVO

External links

http://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###