6.1
CVSSv2

CVE-2022-22168

Published: 19/01/2022 Updated: 26/01/2022
CVSS v2 Base Score: 6.1 | Impact Score: 6.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 544
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent malicious user to trigger a Missing Release of Memory after Effective Lifetime vulnerability. Continued exploitation of this vulnerability will eventually lead to an FPC reboot and thereby a Denial of Service (DoS). This issue affects: Juniper Networks Junos OS on vMX and MX150: All versions before 19.2R1-S8, 19.2R3-S4; 19.3 versions before 19.3R3-S5; 19.4 versions before 19.4R2-S5, 19.4R3-S6; 20.1 versions before 20.1R3-S2; 20.2 versions before 20.2R3-S3; 20.3 versions before 20.3R3-S1; 20.4 versions before 20.4R3; 21.1 versions before 21.1R2-S1, 21.1R3; 21.2 versions before 21.2R1-S1, 21.2R2; 21.3 versions before 21.3R1-S1, 21.3R2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos

juniper junos 19.2

juniper junos 19.3

juniper junos 19.4

juniper junos 20.1

juniper junos 20.2

juniper junos 20.3

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2

juniper junos 21.3