Vulnerability Details : CVE-2022-22227
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
Vulnerability category: Denial of service
Products affected by CVE-2022-22227
- cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-22227
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-22227
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
Juniper Networks, Inc. |
CWE ids for CVE-2022-22227
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
References for CVE-2022-22227
-
https://kb.juniper.net/JSA69878
2022-10 Security Bulletin: Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which will cause increased CPU utilization (CVE-2022-22227)Vendor Advisory
Jump to