5
CVSSv2

CVE-2022-22178

Published: 19/01/2022 Updated: 26/01/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked malicious user to cause a flowd crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can be triggered by a specific Session Initiation Protocol (SIP) invite packet if the SIP ALG is enabled. Due to this, the PIC will be rebooted and all traffic that traverses the PIC will be dropped. This issue affects: Juniper Networks Junos OS 20.4 versions before 20.4R3-S2; 21.1 versions before 21.1R2-S1, 21.1R3; 21.2 versions before 21.2R2; 21.3 versions before 21.3R2. This issue does not affect Juniper Networks Junos OS versions before 20.4R1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2

juniper junos 21.3