mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
164 lines
5.8 KiB
JSON
164 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2022-22203",
|
|
"sourceIdentifier": "sirt@juniper.net",
|
|
"published": "2022-07-20T15:15:08.333",
|
|
"lastModified": "2024-11-21T06:46:23.000",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An Incorrect Comparison vulnerability in PFE of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS). On QFX5000 Series, and EX4600 and EX4650 platforms, the fxpc process will crash followed by the FPC reboot upon receipt of a specific hostbound packet. Continued receipt of these specific packets will create a sustained Denial of Service (DoS) condition. This issue only affects Juniper Networks Junos OS 19.4 version 19.4R3-S4."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de comparaci\u00f3n incorrecta en PFE del Sistema Operativo Junos de Juniper Networks permite a un atacante adyacente no autenticado causar una Denegaci\u00f3n de Servicio (DoS). En la serie QFX5000 y en las plataformas EX4600 y EX4650, el proceso fxpc ser\u00e1 bloqueado seguido del reinicio de la FPC al recibir un paquete espec\u00edfico dirigido al host. La recepci\u00f3n continuada de estos paquetes espec\u00edficos crear\u00e1 una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS) sostenida. Este problema s\u00f3lo afecta a Juniper Networks Junos OS 19.4 versi\u00f3n 19.4R3-S4"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "sirt@juniper.net",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "sirt@juniper.net",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-697"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A209EE6F-E676-4172-8FF3-4E03748DEB13"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B425BB1-3C78-42B1-A6C1-216E514191F0"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E974B4BC-64C5-4BB6-AF31-D46AF3763416"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79A8847B-4F98-4949-8639-5CD2B411D10F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09EBDE4B-764F-4DF1-844A-BB8A52CD53EF"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB58A6E9-FFCF-4331-AC3B-45C37BD1943E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDC5478F-A047-4F6D-BB11-0077A74C0174"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D877320D-1997-4B66-B11B-864020C755E1"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D193BEBD-9436-468D-B89E-D5720603451D"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:juniper:qfx5700:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7D6C74F-E85F-4D62-BDAF-FE619B467C76"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://kb.juniper.net/JSA69707",
|
|
"source": "sirt@juniper.net",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://kb.juniper.net/JSA69707",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |