Skip to main content

CVE-2022-22225: Denial of Service (DoS) in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2022-22225cvecve-2022-22225cwe-367
Published: Tue Oct 18 2022 (10/18/2022, 02:46:26 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker with an established BGP session to cause a Denial of Service (DoS). In a BGP multipath scenario, when one of the contributing routes is flapping often and rapidly, rpd may crash. As this crash depends on whether a route is a contributing route, and on the internal timing of the events triggered by the flap this vulnerability is outside the direct control of a potential attacker. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S6; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S4-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R2-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect: Juniper Networks Junos OS versions 19.2 versions prior to 19.2R2, 19.3R1 and above prior to 20.2R1. Juniper Networks Junos OS Evolved versions prior to 20.2R1-EVO.

AI-Powered Analysis

AILast updated: 07/04/2025, 22:25:38 UTC

Technical Analysis

CVE-2022-22225 is a medium-severity vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved, specifically within the Routing Protocol Daemon (rpd) component that handles BGP (Border Gateway Protocol) operations. The vulnerability is a Time-of-check Time-of-use (TOCTOU) race condition that can be triggered in a BGP multipath environment when one of the contributing routes is flapping rapidly. This causes the rpd process to crash, resulting in a Denial of Service (DoS). The attacker does not require authentication but must have an established BGP session to exploit this issue. However, the ability to trigger the crash depends on internal timing and whether the route is a contributing route, which is outside direct attacker control, making exploitation less straightforward. The vulnerability affects multiple versions of Junos OS from 20.2 through 21.3 and corresponding Junos OS Evolved versions prior to certain patched releases. The flaw does not impact versions prior to 19.2R2 or certain other specified releases. The CVSS v3.1 base score is 5.9, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, no user interaction, and impact limited to availability (DoS). No known exploits are reported in the wild as of the publication date. This vulnerability is classified under CWE-367 (Time-of-check Time-of-use race condition). The root cause lies in the race condition during route processing in multipath BGP scenarios, which can cause the routing daemon to crash, potentially disrupting network routing and connectivity.

Potential Impact

For European organizations, especially those operating large-scale networks or ISPs using Juniper Networks Junos OS for their routing infrastructure, this vulnerability poses a risk of network disruption due to the potential crash of the routing daemon. A DoS on routing infrastructure can lead to loss of network availability, impacting business operations, critical communications, and services dependent on stable BGP routing. This is particularly significant for sectors reliant on continuous network uptime such as finance, telecommunications, government, and critical infrastructure. The requirement for an established BGP session limits exploitation to peers or attackers who can establish such sessions, which may reduce risk from external attackers but does not eliminate insider or misconfigured peer risks. The race condition's dependence on route flapping and timing means exploitation is non-trivial but possible in unstable or intentionally manipulated routing environments. Disruptions in BGP routing can cause traffic blackholing, routing loops, or loss of connectivity, which can cascade into broader network outages. Given the widespread use of Juniper routers in European backbone and enterprise networks, the impact could be significant if exploited.

Mitigation Recommendations

1. Immediate application of vendor patches and updates: Organizations should upgrade affected Junos OS and Junos OS Evolved versions to the fixed releases specified by Juniper Networks (e.g., 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R3, 21.2R2, 21.3R2, and corresponding EVO versions). 2. Monitor BGP session stability and route flapping: Implement monitoring to detect rapid route flapping in multipath BGP environments, which can trigger the vulnerability. 3. Restrict BGP session establishment: Limit BGP peerings to trusted and authenticated peers only, reducing the risk of unauthorized session establishment. 4. Implement route flap damping: Configure route flap damping to reduce the impact of unstable routes that could trigger the race condition. 5. Network segmentation and access controls: Isolate routing infrastructure and restrict management access to reduce the attack surface. 6. Incident response readiness: Prepare for potential DoS events by having failover routing strategies and redundancy in place to maintain network availability during rpd crashes. 7. Regularly review and audit routing configurations to avoid misconfigurations that could exacerbate route instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6f53

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 10:25:38 PM

Last updated: 7/28/2025, 12:42:46 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats