Skip to main content

CVE-2022-22230: CWE-20 Improper Input Validation in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2022-22230cvecve-2022-22230cwe-20
Published: Tue Oct 18 2022 (10/18/2022, 02:46:32 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause DoS (Denial of Service). If another router generates more than one specific valid OSPFv3 LSA then rpd will crash while processing these LSAs. This issue only affects systems configured with OSPFv3, while OSPFv2 is not affected. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S6; 19.3 version 19.3R2 and later versions; 19.4 versions prior to 19.4R2-S8, 19.4R3-S9; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S1-EVO; 21.3-EVO versions prior to 21.3R3-S2-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS 19.2 versions prior to 19.2R2.

AI-Powered Analysis

AILast updated: 07/04/2025, 22:26:52 UTC

Technical Analysis

CVE-2022-22230 is a medium-severity vulnerability identified in the Routing Protocol Daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises from improper input validation (CWE-20) when processing specific valid OSPFv3 Link State Advertisements (LSAs). An adjacent unauthenticated attacker—meaning an attacker with network adjacency but no authentication privileges—can exploit this flaw by sending more than one crafted OSPFv3 LSA to the vulnerable router. This causes the rpd process to crash, resulting in a Denial of Service (DoS) condition. The vulnerability specifically affects systems configured with OSPFv3; OSPFv2 configurations are not impacted. The affected Junos OS versions span multiple releases from 19.2 through 21.4, including various patch levels and Junos OS Evolved versions prior to certain fixed releases. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting a medium severity level. The attack vector is adjacent network access (AV:A), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild as of the publication date. This vulnerability can cause network outages or routing instability by crashing the routing daemon, potentially disrupting network traffic and services dependent on affected routers. Given that Juniper routers are widely deployed in enterprise and service provider networks, this vulnerability poses a risk to network reliability where OSPFv3 is used for routing IPv6 traffic.

Potential Impact

For European organizations, the impact of CVE-2022-22230 can be significant, especially for those relying on Juniper Networks routers running vulnerable Junos OS versions with OSPFv3 enabled. The Denial of Service caused by rpd crashes can lead to routing disruptions, loss of network connectivity, and degraded availability of critical services. This can affect enterprises, data centers, internet service providers, and telecommunications operators. Given the increasing adoption of IPv6 and OSPFv3 in Europe, the vulnerability could disrupt IPv6 routing infrastructure, impacting internal and external communications. Network outages may result in operational downtime, financial losses, and reputational damage. Additionally, the adjacent network access requirement means that attackers must be on the same Layer 2 or Layer 3 network segment or have some degree of network access, which could be possible in multi-tenant data centers, shared infrastructure, or compromised internal networks. The vulnerability does not compromise confidentiality or integrity, but the availability impact alone can be critical for organizations with stringent uptime requirements.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify all Juniper routers running affected Junos OS or Junos OS Evolved versions with OSPFv3 enabled. 2) Apply the latest Juniper patches and updates that address CVE-2022-22230 as soon as possible. Juniper has released fixed versions starting from 19.2R3-S6 and corresponding patches for subsequent releases. 3) If immediate patching is not feasible, consider disabling OSPFv3 on affected devices temporarily if IPv6 routing is not critical or can be rerouted. 4) Implement network segmentation and strict access controls to limit adjacency to trusted devices only, reducing the risk of an attacker gaining the required network proximity. 5) Monitor network devices for abnormal rpd crashes or OSPFv3 LSA traffic anomalies that could indicate exploitation attempts. 6) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting unusual OSPFv3 LSA patterns. 7) Review and strengthen internal network security policies to prevent unauthorized lateral movement that could enable adjacency to critical routers. These steps go beyond generic advice by focusing on immediate patching, network architecture adjustments, and active monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd6fd7

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 10:26:52 PM

Last updated: 7/25/2025, 12:38:39 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats