ID

VAR-202201-0626


CVE

CVE-2022-22166


TITLE

Juniper Networks Junos OS  Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003893

DESCRIPTION

An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS). If a BGP update message is received over an established BGP session where a BGP SR-TE policy tunnel attribute is malformed and BGP update tracing flag is enabled, the rpd will core. This issue can happen with any BGP session as long as the previous conditions are met. This issue can not propagate as the crash occurs as soon as the malformed update is received. This issue affects Juniper Networks Junos OS: 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1

Trust: 1.8

sources: NVD: CVE-2022-22166 // JVNDB: JVNDB-2022-003893 // VULHUB: VHN-409695 // VULMON: CVE-2022-22166

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:20.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.1

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos osscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003893 // NVD: CVE-2022-22166

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22166
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2022-22166
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-22166
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202201-916
value: MEDIUM

Trust: 0.6

VULHUB: VHN-409695
value: LOW

Trust: 0.1

VULMON: CVE-2022-22166
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-22166
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-409695
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-22166
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-003893
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-409695 // VULMON: CVE-2022-22166 // JVNDB: JVNDB-2022-003893 // CNNVD: CNNVD-202201-916 // NVD: CVE-2022-22166 // NVD: CVE-2022-22166

PROBLEMTYPE DATA

problemtype:CWE-1284

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-20

Trust: 0.1

sources: VULHUB: VHN-409695 // JVNDB: JVNDB-2022-003893 // NVD: CVE-2022-22166

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202201-916

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202201-916

PATCH

title:JSA11274url:https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-An-rpd-core-will-occur-if-BGP-update-tracing-is-configured-and-an-update-containing-a-malformed-BGP-SR-TE-policy-tunnel-attribute-is-received-CVE-2022-22166?language=en_US

Trust: 0.8

title:Juniper Networks Junos OS Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=178752

Trust: 0.6

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-22166 // JVNDB: JVNDB-2022-003893 // CNNVD: CNNVD-202201-916

EXTERNAL IDS

db:NVDid:CVE-2022-22166

Trust: 3.4

db:JUNIPERid:JSA11274

Trust: 1.8

db:JVNDBid:JVNDB-2022-003893

Trust: 0.8

db:CS-HELPid:SB2022011234

Trust: 0.6

db:CNNVDid:CNNVD-202201-916

Trust: 0.6

db:VULHUBid:VHN-409695

Trust: 0.1

db:VULMONid:CVE-2022-22166

Trust: 0.1

sources: VULHUB: VHN-409695 // VULMON: CVE-2022-22166 // JVNDB: JVNDB-2022-003893 // CNNVD: CNNVD-202201-916 // NVD: CVE-2022-22166

REFERENCES

url:https://kb.juniper.net/jsa11274

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-22166

Trust: 1.4

url:https://vigilance.fr/vulnerability/junos-os-multiple-vulnerabilities-37234

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011234

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/1284.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULHUB: VHN-409695 // VULMON: CVE-2022-22166 // JVNDB: JVNDB-2022-003893 // CNNVD: CNNVD-202201-916 // NVD: CVE-2022-22166

SOURCES

db:VULHUBid:VHN-409695
db:VULMONid:CVE-2022-22166
db:JVNDBid:JVNDB-2022-003893
db:CNNVDid:CNNVD-202201-916
db:NVDid:CVE-2022-22166

LAST UPDATE DATE

2024-11-23T22:36:59.019000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-409695date:2022-01-26T00:00:00
db:VULMONid:CVE-2022-22166date:2023-06-27T00:00:00
db:JVNDBid:JVNDB-2022-003893date:2023-03-10T05:47:00
db:CNNVDid:CNNVD-202201-916date:2023-06-28T00:00:00
db:NVDid:CVE-2022-22166date:2024-11-21T06:46:17.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-409695date:2022-01-19T00:00:00
db:VULMONid:CVE-2022-22166date:2022-01-19T00:00:00
db:JVNDBid:JVNDB-2022-003893date:2023-03-10T00:00:00
db:CNNVDid:CNNVD-202201-916date:2022-01-12T00:00:00
db:NVDid:CVE-2022-22166date:2022-01-19T01:15:08.847