#VU59624 Security features bypass in Juniper Junos OS - CVE-2022-22157
Published: January 17, 2022
Juniper Junos OS
Juniper Networks, Inc.
Description
The vulnerability allows a remote attacker by bypass implemented security restrictions.
The vulnerability exists due to a traffic classification issue on the SRX Series Services Gateways when 'no-syn-check' is enabled on the device. JDPI incorrectly classifies out-of-state asymmetric TCP flows as the dynamic-application INCONCLUSIVE instead of UNKNOWN, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been denied. A remote attacker can bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources.
Note, this issue only occurs when 'set security flow tcp-session no-syn-check' is configured on the device.