cvelist/2022/22xxx/CVE-2022-22192.json
2022-10-18 03:00:34 +00:00

142 lines
5.8 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2022-10-12T16:00:00.000Z",
"ID": "CVE-2022-22192",
"STATE": "PUBLIC",
"TITLE": "Junos OS Evolved: PTX Series: An attacker can cause a kernel panic by sending a malformed TCP packet to the device"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS Evolved",
"version": {
"version_data": [
{
"platform": "PTX10004, PTX10008, PTX10016",
"version_affected": "<",
"version_name": "20.4-EVO",
"version_value": "20.4R3-S4-EVO"
},
{
"platform": "PTX10004, PTX10008, PTX10016",
"version_affected": "<",
"version_name": "21.3-EVO",
"version_value": "21.3R3-EVO"
},
{
"platform": "PTX10004, PTX10008, PTX10016",
"version_affected": "<",
"version_name": "21.4-EVO",
"version_value": "21.4R3-EVO"
},
{
"platform": "PTX10004, PTX10008, PTX10016",
"version_affected": "<",
"version_name": "22.1-EVO",
"version_value": "22.1R2-EVO"
},
{
"platform": "PTX10004, PTX10008, PTX10016",
"version_affected": "!<",
"version_value": "20.4R1-EVO"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined to the ports for BGP, LDP and MSDP can trigger this. This issue only affects PTX10004, PTX10008, PTX10016. No other PTX Series devices or other platforms are affected. This issue affects Juniper Networks Junos OS Evolved: 20.4-EVO versions prior to 20.4R3-S4-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 20.4R1-EVO."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (DoS)"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-1286 Improper Validation of Syntactic Correctness of Input"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA69915",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA69915"
}
]
},
"solution": [
{
"lang": "eng",
"value": "The following Junos OS Evolved software releases have been updated to resolve this specific issue: 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases."
}
],
"source": {
"advisory": "JSA69915",
"defect": [
"1663201"
],
"discovery": "USER"
},
"work_around": [
{
"lang": "eng",
"value": "There are no known workarounds for this issue."
}
]
}