ID

VAR-202201-1558


CVE

CVE-2022-22169


TITLE

Juniper Networks Junos OS  and  Junos OS Evolved  Initialization vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-004210

DESCRIPTION

An Improper Initialization vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker who sends specific packets in certain orders and at specific timings to force OSPFv3 to unexpectedly enter graceful-restart (GR helper mode) even though there is not any Grace-LSA received in OSPFv3 causing a Denial of Service (DoS). Unexpectedly entering GR helper mode might cause the OSPFv3 neighbor adjacency formed on this interface to be stuck in the "INIT" state which can be observed by issuing the following command: user@device> show ospf3 neighbor ID Interface State xx.xx.xx.xx ae100.0 Init <<<<<<<<<< An indicator of compromise can be seen in log files when traceoptions for OSPFv3 are enabled before the issue occurs. These logfile messages are as follows: OSPF restart signaling: Received hello with LR bit set from nbr ip=xx::xx id=xx.xx.xx.xx. Set oob-resync capabilty 1. OSPF Restart Signaling: Start helper mode for nbr ip xx::xx id xx.xx.xx.xx OSPF restart signaling: abort helper mode for nbr ip=xx::xx id=xx.xx.xx.xx OSPF neighbor xx::xx (realm ipv6-unicast <interface.unit> area xx.xx.xx.xx) state changed from Full to Init due to 1WayRcvd (event reason: neighbor is in one-way mode) (nbr helped: 0) This issue affects: Juniper Networks Junos OS. 15.1 versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S4; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. This issue does not affect any version of Juniper Networks Junos OS 12.3. This issue affects Juniper Networks Junos OS Evolved all versions prior to 21.2R2-EVO

Trust: 1.8

sources: NVD: CVE-2022-22169 // JVNDB: JVNDB-2022-004210 // VULHUB: VHN-409698 // VULMON: CVE-2022-22169

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:21.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.2

Trust: 1.0

vendor:junipermodel:junos os evolvedscope:eqversion:21.2

Trust: 1.0

vendor:junipermodel:junos os evolvedscope:ltversion:21.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos os evolvedscope: - version: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-004210 // NVD: CVE-2022-22169

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22169
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2022-22169
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-22169
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202201-918
value: MEDIUM

Trust: 0.6

VULHUB: VHN-409698
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-22169
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-22169
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-409698
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-22169
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-004210
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-409698 // VULMON: CVE-2022-22169 // JVNDB: JVNDB-2022-004210 // CNNVD: CNNVD-202201-918 // NVD: CVE-2022-22169 // NVD: CVE-2022-22169

PROBLEMTYPE DATA

problemtype:CWE-665

Trust: 1.1

problemtype:Improper initialization (CWE-665) [ others ]

Trust: 0.8

sources: VULHUB: VHN-409698 // JVNDB: JVNDB-2022-004210 // NVD: CVE-2022-22169

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202201-918

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202201-918

PATCH

title:JSA11276url:https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OSPFv3-session-might-go-into-INIT-state-upon-receipt-of-multiple-crafted-packets-from-a-trusted-neighbor-device-CVE-2022-22169?language=en_US

Trust: 0.8

title:Juniper Networks Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=183779

Trust: 0.6

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-22169 // JVNDB: JVNDB-2022-004210 // CNNVD: CNNVD-202201-918

EXTERNAL IDS

db:NVDid:CVE-2022-22169

Trust: 3.4

db:JUNIPERid:JSA11276

Trust: 1.8

db:JVNDBid:JVNDB-2022-004210

Trust: 0.8

db:CS-HELPid:SB2022011232

Trust: 0.6

db:CNNVDid:CNNVD-202201-918

Trust: 0.6

db:VULHUBid:VHN-409698

Trust: 0.1

db:VULMONid:CVE-2022-22169

Trust: 0.1

sources: VULHUB: VHN-409698 // VULMON: CVE-2022-22169 // JVNDB: JVNDB-2022-004210 // CNNVD: CNNVD-202201-918 // NVD: CVE-2022-22169

REFERENCES

url:https://kb.juniper.net/jsa11276

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-22169

Trust: 1.4

url:https://vigilance.fr/vulnerability/junos-os-multiple-vulnerabilities-37234

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011232

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/665.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: VULHUB: VHN-409698 // VULMON: CVE-2022-22169 // JVNDB: JVNDB-2022-004210 // CNNVD: CNNVD-202201-918 // NVD: CVE-2022-22169

SOURCES

db:VULHUBid:VHN-409698
db:VULMONid:CVE-2022-22169
db:JVNDBid:JVNDB-2022-004210
db:CNNVDid:CNNVD-202201-918
db:NVDid:CVE-2022-22169

LAST UPDATE DATE

2024-08-14T14:44:05.471000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-409698date:2022-02-01T00:00:00
db:VULMONid:CVE-2022-22169date:2022-02-01T00:00:00
db:JVNDBid:JVNDB-2022-004210date:2023-03-31T01:40:00
db:CNNVDid:CNNVD-202201-918date:2022-02-28T00:00:00
db:NVDid:CVE-2022-22169date:2022-02-01T20:01:41.813

SOURCES RELEASE DATE

db:VULHUBid:VHN-409698date:2022-01-19T00:00:00
db:VULMONid:CVE-2022-22169date:2022-01-19T00:00:00
db:JVNDBid:JVNDB-2022-004210date:2023-03-31T00:00:00
db:CNNVDid:CNNVD-202201-918date:2022-01-12T00:00:00
db:NVDid:CVE-2022-22169date:2022-01-19T01:15:09.023