#VU68274 Improper Check or Handling of Exceptional Conditions in Juniper Junos OS - CVE-2022-22218 

 

#VU68274 Improper Check or Handling of Exceptional Conditions in Juniper Junos OS - CVE-2022-22218

Published: October 12, 2022


Vulnerability identifier: #VU68274
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-22218
CWE-ID: CWE-703
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Juniper Junos OS
Software vendor:
Juniper Networks, Inc.

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment. A remote attacker can send a malformed response from the Certificate Authority (CA) server and crash the pkid process.

The vulnerability affects Juniper Networks Junos OS on SRX Series.


Remediation

Install updates from vendor's website.

External links