ID

VAR-202201-0620


CVE

CVE-2022-22176


TITLE

Juniper Networks Junos OS  Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003888

DESCRIPTION

An Improper Validation of Syntactic Correctness of Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker sending a malformed DHCP packet to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If option-82 is configured in a DHCP snooping / -security scenario, jdhcpd crashes if a specific malformed DHCP request packet is received. The DHCP functionality is impacted while jdhcpd restarts, and continued exploitation of the vulnerability will lead to the unavailability of the DHCP service and thereby a sustained DoS. This issue affects Juniper Networks Junos OS 13.2 version 13.2R1 and later versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S3; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. This issue does not affect Juniper Networks Junos OS version 12.3R12 and prior versions

Trust: 1.8

sources: NVD: CVE-2022-22176 // JVNDB: JVNDB-2022-003888 // VULHUB: VHN-409705 // VULMON: CVE-2022-22176

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:14.1x51

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d25

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.2x51

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d30

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x50

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d15

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.2r6

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.3r9

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x55

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d26

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d27

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.2x52

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d10

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1r7

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53-d35

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.1

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos osscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003888 // NVD: CVE-2022-22176

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22176
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2022-22176
value: HIGH

Trust: 1.0

NVD: CVE-2022-22176
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202201-907
value: MEDIUM

Trust: 0.6

VULHUB: VHN-409705
value: LOW

Trust: 0.1

VULMON: CVE-2022-22176
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-22176
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-409705
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-22176
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sirt@juniper.net: CVE-2022-22176
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: CVE-2022-22176
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-409705 // VULMON: CVE-2022-22176 // JVNDB: JVNDB-2022-003888 // CNNVD: CNNVD-202201-907 // NVD: CVE-2022-22176 // NVD: CVE-2022-22176

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-1286

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-409705 // JVNDB: JVNDB-2022-003888 // NVD: CVE-2022-22176

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202201-907

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202201-907

PATCH

title:JSA11282url:https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-In-a-scenario-with-dhcp-security-and-option-82-configured-jdhcpd-crashes-upon-receipt-of-a-malformed-DHCP-packet-CVE-2022-22176?language=en_US

Trust: 0.8

title:Juniper Networks Junos OS Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=179691

Trust: 0.6

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-22176 // JVNDB: JVNDB-2022-003888 // CNNVD: CNNVD-202201-907

EXTERNAL IDS

db:NVDid:CVE-2022-22176

Trust: 3.4

db:JUNIPERid:JSA11282

Trust: 1.8

db:JVNDBid:JVNDB-2022-003888

Trust: 0.8

db:CNNVDid:CNNVD-202201-907

Trust: 0.6

db:VULHUBid:VHN-409705

Trust: 0.1

db:VULMONid:CVE-2022-22176

Trust: 0.1

sources: VULHUB: VHN-409705 // VULMON: CVE-2022-22176 // JVNDB: JVNDB-2022-003888 // CNNVD: CNNVD-202201-907 // NVD: CVE-2022-22176

REFERENCES

url:https://kb.juniper.net/jsa11282

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-22176

Trust: 1.4

url:https://vigilance.fr/vulnerability/junos-os-multiple-vulnerabilities-37234

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULHUB: VHN-409705 // VULMON: CVE-2022-22176 // JVNDB: JVNDB-2022-003888 // CNNVD: CNNVD-202201-907 // NVD: CVE-2022-22176

SOURCES

db:VULHUBid:VHN-409705
db:VULMONid:CVE-2022-22176
db:JVNDBid:JVNDB-2022-003888
db:CNNVDid:CNNVD-202201-907
db:NVDid:CVE-2022-22176

LAST UPDATE DATE

2024-08-14T15:06:34.725000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-409705date:2022-01-26T00:00:00
db:VULMONid:CVE-2022-22176date:2022-01-26T00:00:00
db:JVNDBid:JVNDB-2022-003888date:2023-03-10T05:05:00
db:CNNVDid:CNNVD-202201-907date:2022-01-27T00:00:00
db:NVDid:CVE-2022-22176date:2022-01-26T18:51:39.527

SOURCES RELEASE DATE

db:VULHUBid:VHN-409705date:2022-01-19T00:00:00
db:VULMONid:CVE-2022-22176date:2022-01-19T00:00:00
db:JVNDBid:JVNDB-2022-003888date:2023-03-10T00:00:00
db:CNNVDid:CNNVD-202201-907date:2022-01-12T00:00:00
db:NVDid:CVE-2022-22176date:2022-01-19T01:15:09.457