ID

VAR-202210-0717


CVE

CVE-2022-22220


TITLE

Juniper Networks  Junos OS  and  Junos OS Evolved  In  Time-of-check Time-of-use (TOCTOU)  Race condition vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2022-019502

DESCRIPTION

A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, Junos OS Evolved allows a network-based unauthenticated attacker to cause a Denial of Service (DoS). When a BGP flow route with redirect IP extended community is received, and the reachability to the next-hop of the corresponding redirect IP is flapping, the rpd process might crash. Whether the crash occurs depends on the timing of the internally processing of these two events and is outside the attackers control. Please note that this issue also affects Route-Reflectors unless 'routing-options flow firewall-install-disable' is configured. This issue affects: Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.4 versions prior to 19.4R3-S8; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1-EVO versions prior to 21.1R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1

Trust: 1.71

sources: NVD: CVE-2022-22220 // JVNDB: JVNDB-2022-019502 // VULHUB: VHN-409749

AFFECTED PRODUCTS

vendor:junipermodel:junos os evolvedscope:eqversion:21.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.3

Trust: 1.0

vendor:junipermodel:junosscope:ltversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.2

Trust: 1.0

vendor:junipermodel:junos os evolvedscope:eqversion:20.4

Trust: 1.0

vendor:junipermodel:junos os evolvedscope:ltversion:20.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:21.1

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos os evolvedscope: - version: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019502 // NVD: CVE-2022-22220

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22220
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2022-22220
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-22220
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202210-669
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-22220
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-22220
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019502 // CNNVD: CNNVD-202210-669 // NVD: CVE-2022-22220 // NVD: CVE-2022-22220

PROBLEMTYPE DATA

problemtype:CWE-367

Trust: 1.1

problemtype:Time-of-check Time-of-use (TOCTOU) Race condition (CWE-367) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-409749 // JVNDB: JVNDB-2022-019502 // NVD: CVE-2022-22220

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202210-669

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202210-669

EXTERNAL IDS

db:NVDid:CVE-2022-22220

Trust: 3.3

db:JUNIPERid:JSA69902

Trust: 2.5

db:JVNDBid:JVNDB-2022-019502

Trust: 0.8

db:AUSCERTid:ESB-2022.5671

Trust: 0.6

db:CNNVDid:CNNVD-202210-669

Trust: 0.6

db:VULHUBid:VHN-409749

Trust: 0.1

sources: VULHUB: VHN-409749 // JVNDB: JVNDB-2022-019502 // CNNVD: CNNVD-202210-669 // NVD: CVE-2022-22220

REFERENCES

url:https://kb.juniper.net/jsa69902

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-22220

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2022.5671

Trust: 0.6

url:https://vigilance.fr/vulnerability/junos-os-multiple-vulnerabilities-39531

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-22220/

Trust: 0.6

sources: VULHUB: VHN-409749 // JVNDB: JVNDB-2022-019502 // CNNVD: CNNVD-202210-669 // NVD: CVE-2022-22220

SOURCES

db:VULHUBid:VHN-409749
db:JVNDBid:JVNDB-2022-019502
db:CNNVDid:CNNVD-202210-669
db:NVDid:CVE-2022-22220

LAST UPDATE DATE

2024-08-14T15:16:27.662000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-409749date:2022-10-20T00:00:00
db:JVNDBid:JVNDB-2022-019502date:2023-10-25T08:16:00
db:CNNVDid:CNNVD-202210-669date:2022-11-09T00:00:00
db:NVDid:CVE-2022-22220date:2022-10-20T20:21:56.437

SOURCES RELEASE DATE

db:VULHUBid:VHN-409749date:2022-10-18T00:00:00
db:JVNDBid:JVNDB-2022-019502date:2023-10-25T00:00:00
db:CNNVDid:CNNVD-202210-669date:2022-10-12T00:00:00
db:NVDid:CVE-2022-22220date:2022-10-18T03:15:09.650