NA

CVE-2022-22233

Published: 18/10/2022 Updated: 27/06/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

An Unchecked Return Value to NULL Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In Segment Routing (SR) to Label Distribution Protocol (LDP) interworking scenario, configured with Segment Routing Mapping Server (SRMS) at any node, when an Area Border Router (ABR) leaks the SRMS entries having "S" flag set from IS-IS Level 2 to Level 1, an rpd core might be observed when a specific low privileged CLI command is issued. This issue affects: Juniper Networks Junos OS 21.4 versions before 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions before 22.1R2. Juniper Networks Junos OS Evolved 21.4-EVO versions before 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO; 22.1-EVO versions before 22.1R2-EVO. This issue does not affect: Juniper Networks Junos OS versions before 21.4R1. Juniper Networks Junos OS Evolved versions before 21.4R1-EVO.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 21.4

juniper junos os evolved 21.4

juniper junos 22.1

juniper junos os evolved 22.1