Skip to main content

CVE-2022-22192: Denial of Service (DoS) in Juniper Networks Junos OS Evolved

High
VulnerabilityCVE-2022-22192cvecve-2022-22192cwe-1286
Published: Tue Oct 18 2022 (10/18/2022, 02:46:17 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS Evolved

Description

An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined to the ports for BGP, LDP and MSDP can trigger this. This issue only affects PTX10004, PTX10008, PTX10016. No other PTX Series devices or other platforms are affected. This issue affects Juniper Networks Junos OS Evolved: 20.4-EVO versions prior to 20.4R3-S4-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 20.4R1-EVO.

AI-Powered Analysis

AILast updated: 07/04/2025, 22:12:12 UTC

Technical Analysis

CVE-2022-22192 is a high-severity vulnerability affecting Juniper Networks Junos OS Evolved running on specific PTX series routers (PTX10004, PTX10008, PTX10016). The vulnerability arises from improper validation of the syntactic correctness of incoming TCP packets destined for certain critical routing protocol ports: BGP (Border Gateway Protocol), LDP (Label Distribution Protocol), and MSDP (Multicast Source Discovery Protocol). Specifically, malformed TCP packets targeting these ports can trigger a kernel panic in the device's operating system kernel, resulting in a Denial of Service (DoS) condition. This vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it particularly dangerous for exposed network infrastructure. The affected Junos OS Evolved versions include 20.4-EVO prior to 20.4R3-S4-EVO, 21.3-EVO prior to 21.3R3-EVO, 21.4-EVO prior to 21.4R3-EVO, and 22.1-EVO prior to 22.1R2-EVO. Versions prior to 20.4R1-EVO are not affected. The vulnerability is classified under CWE-1286, which relates to improper validation of input syntax. The CVSS v3.1 base score is 7.5, indicating a high severity due to network attack vector, no privileges required, no user interaction, and impact limited to availability (DoS). No known exploits have been reported in the wild to date. This vulnerability specifically targets the kernel's TCP packet processing for critical routing protocols, which are essential for maintaining network routing stability and connectivity in service provider and large enterprise environments using Juniper PTX routers.

Potential Impact

For European organizations, especially large ISPs, telecom operators, and enterprises relying on Juniper PTX10000 series routers for core network routing, this vulnerability poses a significant risk to network availability and stability. Exploitation could lead to kernel panics causing device crashes and service outages, disrupting critical routing protocols such as BGP, which underpin internet and inter-network routing. This could result in partial or complete loss of network connectivity, degraded service quality, and potential cascading failures in dependent systems. Given the routers' role in backbone and edge routing, outages could impact multiple downstream customers and services. The lack of authentication and user interaction requirements means attackers can remotely launch DoS attacks from anywhere, increasing the threat surface. Although no exploits are known in the wild, the high severity and ease of exploitation make it a credible threat, particularly in hostile geopolitical environments or against organizations targeted by sophisticated threat actors. The impact on confidentiality and integrity is minimal, but the availability impact is high, which is critical for network infrastructure. European organizations with exposed or poorly segmented network infrastructure are at elevated risk.

Mitigation Recommendations

Organizations should promptly identify if they operate affected Juniper PTX10004, PTX10008, or PTX10016 routers running vulnerable Junos OS Evolved versions. Immediate steps include: 1) Applying the vendor-provided patches or upgrading to fixed versions (20.4R3-S4-EVO or later, 21.3R3-EVO or later, 21.4R3-EVO or later, 22.1R2-EVO or later) to remediate the vulnerability. 2) Implementing strict ingress filtering and packet validation at network perimeters to block malformed TCP packets targeting BGP, LDP, and MSDP ports before they reach the routers. 3) Restricting access to these critical routing protocol ports to trusted management networks and peers only, using ACLs and firewall rules. 4) Monitoring network traffic for anomalous or malformed packets directed at these ports and setting up alerts for potential exploitation attempts. 5) Employing network segmentation to isolate critical routing infrastructure from untrusted networks. 6) Conducting regular vulnerability assessments and penetration testing focused on network infrastructure to detect similar issues proactively. These measures go beyond generic advice by focusing on network-level controls and operational best practices tailored to the specific protocols and devices affected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6ed9

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 10:12:12 PM

Last updated: 8/17/2025, 7:08:47 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats