7.5
CVSSv3

CVE-2022-22192

Published: 18/10/2022 Updated: 21/10/2022
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated malicious user to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined to the ports for BGP, LDP and MSDP can trigger this. This issue only affects PTX10004, PTX10008, PTX10016. No other PTX Series devices or other platforms are affected. This issue affects Juniper Networks Junos OS Evolved: 20.4-EVO versions before 20.4R3-S4-EVO; 21.3-EVO versions before 21.3R3-EVO; 21.4-EVO versions before 21.4R3-EVO; 22.1-EVO versions before 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions before 20.4R1-EVO.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos_os_evolved 20.4

juniper junos_os_evolved 21.3

juniper junos_os_evolved 21.4

juniper junos_os_evolved 22.1