CVE-2022-22192: Denial of Service (DoS) in Juniper Networks Junos OS Evolved
An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined to the ports for BGP, LDP and MSDP can trigger this. This issue only affects PTX10004, PTX10008, PTX10016. No other PTX Series devices or other platforms are affected. This issue affects Juniper Networks Junos OS Evolved: 20.4-EVO versions prior to 20.4R3-S4-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 20.4R1-EVO.
AI Analysis
Technical Summary
CVE-2022-22192 is a high-severity vulnerability affecting Juniper Networks Junos OS Evolved running on specific PTX series routers (PTX10004, PTX10008, PTX10016). The vulnerability arises from improper validation of the syntactic correctness of incoming TCP packets destined for certain critical routing protocol ports: BGP (Border Gateway Protocol), LDP (Label Distribution Protocol), and MSDP (Multicast Source Discovery Protocol). Specifically, malformed TCP packets targeting these ports can trigger a kernel panic in the device's operating system kernel, resulting in a Denial of Service (DoS) condition. This vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it particularly dangerous for exposed network infrastructure. The affected Junos OS Evolved versions include 20.4-EVO prior to 20.4R3-S4-EVO, 21.3-EVO prior to 21.3R3-EVO, 21.4-EVO prior to 21.4R3-EVO, and 22.1-EVO prior to 22.1R2-EVO. Versions prior to 20.4R1-EVO are not affected. The vulnerability is classified under CWE-1286, which relates to improper validation of input syntax. The CVSS v3.1 base score is 7.5, indicating a high severity due to network attack vector, no privileges required, no user interaction, and impact limited to availability (DoS). No known exploits have been reported in the wild to date. This vulnerability specifically targets the kernel's TCP packet processing for critical routing protocols, which are essential for maintaining network routing stability and connectivity in service provider and large enterprise environments using Juniper PTX routers.
Potential Impact
For European organizations, especially large ISPs, telecom operators, and enterprises relying on Juniper PTX10000 series routers for core network routing, this vulnerability poses a significant risk to network availability and stability. Exploitation could lead to kernel panics causing device crashes and service outages, disrupting critical routing protocols such as BGP, which underpin internet and inter-network routing. This could result in partial or complete loss of network connectivity, degraded service quality, and potential cascading failures in dependent systems. Given the routers' role in backbone and edge routing, outages could impact multiple downstream customers and services. The lack of authentication and user interaction requirements means attackers can remotely launch DoS attacks from anywhere, increasing the threat surface. Although no exploits are known in the wild, the high severity and ease of exploitation make it a credible threat, particularly in hostile geopolitical environments or against organizations targeted by sophisticated threat actors. The impact on confidentiality and integrity is minimal, but the availability impact is high, which is critical for network infrastructure. European organizations with exposed or poorly segmented network infrastructure are at elevated risk.
Mitigation Recommendations
Organizations should promptly identify if they operate affected Juniper PTX10004, PTX10008, or PTX10016 routers running vulnerable Junos OS Evolved versions. Immediate steps include: 1) Applying the vendor-provided patches or upgrading to fixed versions (20.4R3-S4-EVO or later, 21.3R3-EVO or later, 21.4R3-EVO or later, 22.1R2-EVO or later) to remediate the vulnerability. 2) Implementing strict ingress filtering and packet validation at network perimeters to block malformed TCP packets targeting BGP, LDP, and MSDP ports before they reach the routers. 3) Restricting access to these critical routing protocol ports to trusted management networks and peers only, using ACLs and firewall rules. 4) Monitoring network traffic for anomalous or malformed packets directed at these ports and setting up alerts for potential exploitation attempts. 5) Employing network segmentation to isolate critical routing infrastructure from untrusted networks. 6) Conducting regular vulnerability assessments and penetration testing focused on network infrastructure to detect similar issues proactively. These measures go beyond generic advice by focusing on network-level controls and operational best practices tailored to the specific protocols and devices affected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Switzerland
CVE-2022-22192: Denial of Service (DoS) in Juniper Networks Junos OS Evolved
Description
An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined to the ports for BGP, LDP and MSDP can trigger this. This issue only affects PTX10004, PTX10008, PTX10016. No other PTX Series devices or other platforms are affected. This issue affects Juniper Networks Junos OS Evolved: 20.4-EVO versions prior to 20.4R3-S4-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 20.4R1-EVO.
AI-Powered Analysis
Technical Analysis
CVE-2022-22192 is a high-severity vulnerability affecting Juniper Networks Junos OS Evolved running on specific PTX series routers (PTX10004, PTX10008, PTX10016). The vulnerability arises from improper validation of the syntactic correctness of incoming TCP packets destined for certain critical routing protocol ports: BGP (Border Gateway Protocol), LDP (Label Distribution Protocol), and MSDP (Multicast Source Discovery Protocol). Specifically, malformed TCP packets targeting these ports can trigger a kernel panic in the device's operating system kernel, resulting in a Denial of Service (DoS) condition. This vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it particularly dangerous for exposed network infrastructure. The affected Junos OS Evolved versions include 20.4-EVO prior to 20.4R3-S4-EVO, 21.3-EVO prior to 21.3R3-EVO, 21.4-EVO prior to 21.4R3-EVO, and 22.1-EVO prior to 22.1R2-EVO. Versions prior to 20.4R1-EVO are not affected. The vulnerability is classified under CWE-1286, which relates to improper validation of input syntax. The CVSS v3.1 base score is 7.5, indicating a high severity due to network attack vector, no privileges required, no user interaction, and impact limited to availability (DoS). No known exploits have been reported in the wild to date. This vulnerability specifically targets the kernel's TCP packet processing for critical routing protocols, which are essential for maintaining network routing stability and connectivity in service provider and large enterprise environments using Juniper PTX routers.
Potential Impact
For European organizations, especially large ISPs, telecom operators, and enterprises relying on Juniper PTX10000 series routers for core network routing, this vulnerability poses a significant risk to network availability and stability. Exploitation could lead to kernel panics causing device crashes and service outages, disrupting critical routing protocols such as BGP, which underpin internet and inter-network routing. This could result in partial or complete loss of network connectivity, degraded service quality, and potential cascading failures in dependent systems. Given the routers' role in backbone and edge routing, outages could impact multiple downstream customers and services. The lack of authentication and user interaction requirements means attackers can remotely launch DoS attacks from anywhere, increasing the threat surface. Although no exploits are known in the wild, the high severity and ease of exploitation make it a credible threat, particularly in hostile geopolitical environments or against organizations targeted by sophisticated threat actors. The impact on confidentiality and integrity is minimal, but the availability impact is high, which is critical for network infrastructure. European organizations with exposed or poorly segmented network infrastructure are at elevated risk.
Mitigation Recommendations
Organizations should promptly identify if they operate affected Juniper PTX10004, PTX10008, or PTX10016 routers running vulnerable Junos OS Evolved versions. Immediate steps include: 1) Applying the vendor-provided patches or upgrading to fixed versions (20.4R3-S4-EVO or later, 21.3R3-EVO or later, 21.4R3-EVO or later, 22.1R2-EVO or later) to remediate the vulnerability. 2) Implementing strict ingress filtering and packet validation at network perimeters to block malformed TCP packets targeting BGP, LDP, and MSDP ports before they reach the routers. 3) Restricting access to these critical routing protocol ports to trusted management networks and peers only, using ACLs and firewall rules. 4) Monitoring network traffic for anomalous or malformed packets directed at these ports and setting up alerts for potential exploitation attempts. 5) Employing network segmentation to isolate critical routing infrastructure from untrusted networks. 6) Conducting regular vulnerability assessments and penetration testing focused on network infrastructure to detect similar issues proactively. These measures go beyond generic advice by focusing on network-level controls and operational best practices tailored to the specific protocols and devices affected.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2021-12-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6ed9
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 10:12:12 PM
Last updated: 8/17/2025, 7:08:47 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.