Skip to main content

CVE-2022-22227: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved

Medium
VulnerabilityCVE-2022-22227cvecve-2022-22227cwe-754
Published: Tue Oct 18 2022 (10/18/2022, 02:46:28 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS Evolved

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.

AI-Powered Analysis

AILast updated: 07/04/2025, 22:26:09 UTC

Technical Analysis

CVE-2022-22227 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting Juniper Networks Junos OS Evolved running on specific ACX7000 Series devices, namely ACX7100-48L, ACX7100-32C, and ACX7509. The vulnerability arises in the Packet Forwarding Engine (PFE) component of the operating system. When these devices receive specially crafted IPv6 transit traffic, instead of forwarding the traffic normally, the PFE incorrectly redirects it to the Routing Engine (RE). This behavior causes the RE to experience increased CPU utilization, leading to a partial Denial of Service (DoS) condition. The vulnerability only affects systems configured with IPv6 and does not impact the ACX7024 model, which has already incorporated the fix in Junos OS Evolved version 22.3R1-EVO and later. The affected Junos OS Evolved versions include 21.1-EVO, 21.2-EVO, 21.3-EVO, and 21.4-EVO prior to their respective patched releases (e.g., 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, and 21.4R2-EVO). The vulnerability can be exploited remotely by an unauthenticated attacker via network access, requiring no user interaction or privileges. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the impact is limited to availability (partial DoS), with no confidentiality or integrity impact. There are no known exploits in the wild as of the publication date. The root cause is an improper handling of exceptional IPv6 traffic conditions by the PFE, which leads to resource exhaustion on the RE. This vulnerability could disrupt network operations by degrading routing engine performance and potentially causing service interruptions in environments relying on affected Juniper devices for IPv6 transit traffic.

Potential Impact

For European organizations, especially those operating large-scale networks or internet service providers using Juniper ACX7000 Series routers with Junos OS Evolved, this vulnerability poses a risk of partial Denial of Service. The impact primarily affects network availability and stability, potentially causing degraded routing performance or intermittent outages. Organizations heavily reliant on IPv6 transit traffic are particularly vulnerable, as the attack vector exploits IPv6 packet handling. Disruptions could affect critical infrastructure, enterprise networks, and service providers, leading to operational downtime, degraded user experience, and potential cascading effects on dependent services. Given the increasing adoption of IPv6 in Europe, the risk is non-trivial. However, the lack of confidentiality or integrity impact limits the threat to availability concerns. The unauthenticated, network-based nature of the attack means that threat actors could attempt exploitation remotely without insider access, increasing the attack surface. While no known exploits are reported in the wild, the medium severity rating and ease of exploitation warrant proactive mitigation to prevent potential service disruptions.

Mitigation Recommendations

European organizations should prioritize upgrading affected Juniper Junos OS Evolved devices to the fixed versions as soon as possible: 21.1R3-S2-EVO or later for 21.1-EVO, 21.2R3-S2-EVO or later for 21.2-EVO, 21.3R3-EVO or later for 21.3-EVO, and 21.4R1-S1-EVO or later for 21.4-EVO. Network administrators should audit their environments to identify ACX7100-48L, ACX7100-32C, and ACX7509 devices running vulnerable versions with IPv6 enabled. If immediate patching is not feasible, organizations can implement IPv6 traffic filtering to block or rate-limit suspicious or unexpected IPv6 transit traffic patterns that could trigger the vulnerability. Monitoring CPU utilization on Routing Engines for unusual spikes can provide early detection of exploitation attempts. Employing network segmentation to isolate critical routing infrastructure and applying strict ingress and egress filtering on IPv6 traffic can reduce exposure. Additionally, organizations should maintain up-to-date network device inventories and ensure configuration management practices include vulnerability patching schedules. Coordination with Juniper support and subscribing to their security advisories will help maintain awareness of any emerging threats or additional mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd6fcb

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 10:26:09 PM

Last updated: 8/15/2025, 7:36:14 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats