NA

CVE-2022-22240

Published: 18/10/2022 Updated: 21/10/2022
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged malicious user to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with rib-sharding enabled, two issues may occur when executing a specific CLI command. One is a memory leak issue with rpd where the leak rate is not constant, and the other is a temporary spike in rpd memory usage during command execution. This issue affects: Juniper Networks Junos OS 19.4 versions before 19.4R3-S9; 20.2 versions before 20.2R3-S5; 20.3 versions before 20.3R3-S2; 20.4 versions before 20.4R3-S1; 21.1 versions before 21.1R3; 21.2 versions before 21.2R1-S2, 21.2R2-S1, 21.2R3; 21.3 versions before 21.3R2. Juniper Networks Junos OS Evolved All versions before 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions before 21.2R1-S2-EVO, 21.2R3-EVO; 21.3-EVO versions before 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS versions before 19.2R1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 19.4

juniper junos 20.2

juniper junos 21.1

juniper junos 20.4

juniper junos 20.3

juniper junos 21.3

juniper junos 21.2

juniper junos os evolved 20.4

juniper junos os evolved 21.1

juniper junos os evolved 21.2

juniper junos os evolved 21.3

juniper junos os evolved