5
CVSSv2

CVE-2022-22185

Published: 14/04/2022 Updated: 21/04/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in Juniper Networks Junos OS on SRX Series, allows a network-based unauthenticated malicious user to cause a Denial of Service (DoS) by sending a specific fragmented packet to the device, resulting in a flowd process crash, which is responsible for packet forwarding. Continued receipt and processing of this specific packet will create a sustained DoS condition. This issue only affects SRX Series when 'preserve-incoming-fragment-size' feature is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 18.3 versions before 18.3R3-S6; 18.4 versions before 18.4R3-S10; 19.1 versions before 19.1R3-S7; 19.2 versions before 19.2R3-S4; 19.3 versions before 19.3R3-S4; 19.4 versions before 19.4R3-S6; 20.1 versions before 20.1R3-S2; 20.2 versions before 20.2R3-S3; 20.3 versions before 20.3R3-S1; 20.4 versions before 20.4R3; 21.1 versions before 21.1R2-S1, 21.1R3; 21.2 versions before 21.2R2. This issue does not affect Juniper Networks Junos OS before 17.3R1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 18.3

juniper junos 18.4

juniper junos 19.1

juniper junos 19.2

juniper junos 19.3

juniper junos 19.4

juniper junos 20.1

juniper junos 20.2

juniper junos 20.3

juniper junos 20.4

juniper junos 21.1

juniper junos 21.2