Skip to main content

CVE-2022-22233: CWE-690 Unchecked Return Value to NULL Pointer Dereference in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2022-22233cvecve-2022-22233cwe-690
Published: Tue Oct 18 2022 (10/18/2022, 02:46:35 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Unchecked Return Value to NULL Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In Segment Routing (SR) to Label Distribution Protocol (LDP) interworking scenario, configured with Segment Routing Mapping Server (SRMS) at any node, when an Area Border Router (ABR) leaks the SRMS entries having "S" flag set from IS-IS Level 2 to Level 1, an rpd core might be observed when a specific low privileged CLI command is issued. This issue affects: Juniper Networks Junos OS 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 21.4-EVO versions prior to 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 21.4R1. Juniper Networks Junos OS Evolved versions prior to 21.4R1-EVO.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:11:33 UTC

Technical Analysis

CVE-2022-22233 is a vulnerability identified in the Routing Protocol Daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The flaw arises from an unchecked return value leading to a NULL pointer dereference, classified under CWE-690. This vulnerability specifically manifests in scenarios involving Segment Routing (SR) to Label Distribution Protocol (LDP) interworking, where a Segment Routing Mapping Server (SRMS) is configured at any node. When an Area Border Router (ABR) leaks SRMS entries marked with the "S" flag from IS-IS Level 2 to Level 1, issuing a particular low-privileged CLI command can cause the rpd process to crash, resulting in a Denial of Service (DoS). The vulnerability requires local authentication with low privileges, meaning an attacker must have some level of access to the device but does not need elevated permissions. The affected versions include Junos OS 21.4 prior to 21.4R1-S2, 21.4R2-S1, 21.4R3, and 22.1 versions prior to 22.1R2, as well as corresponding Junos OS Evolved versions. Versions prior to 21.4R1 and 21.4R1-EVO are not affected. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the local attack vector, low complexity, low privileges required, no user interaction, and impact limited to availability (DoS). No known exploits in the wild have been reported. This vulnerability can disrupt network routing services by crashing the rpd daemon, potentially causing network outages or degraded performance in environments relying on affected Juniper devices with the specific SR to LDP interworking configuration.

Potential Impact

For European organizations, the impact of CVE-2022-22233 can be significant in environments where Juniper Networks devices running affected Junos OS versions are deployed, particularly in service provider networks, large enterprises, or critical infrastructure that utilize Segment Routing and IS-IS protocols. The Denial of Service caused by the rpd crash can lead to routing instability, loss of connectivity, and potential cascading network failures. This may disrupt business operations, critical communications, and services dependent on network availability. Given the vulnerability requires local authenticated access, insider threats or compromised administrative accounts pose a risk. Additionally, network maintenance personnel or contractors with limited privileges could inadvertently or maliciously trigger the issue. The medium severity rating indicates that while the vulnerability does not directly compromise confidentiality or integrity, the availability impact on routing infrastructure is non-trivial. European organizations with complex routing architectures leveraging Segment Routing and Juniper devices should be particularly vigilant, as network outages can affect multiple sectors including finance, telecommunications, government, and utilities.

Mitigation Recommendations

1. Upgrade affected Junos OS and Junos OS Evolved devices to the fixed versions: 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2 or later as provided by Juniper Networks. 2. Restrict local CLI access to trusted administrators only, enforcing strict access controls and monitoring for anomalous command usage. 3. Implement robust authentication mechanisms such as multi-factor authentication (MFA) for device access to reduce risk of unauthorized local access. 4. Audit and limit the use of the specific low-privileged CLI commands that can trigger the vulnerability, applying role-based access control (RBAC) to minimize exposure. 5. Monitor rpd daemon stability and system logs for crashes or unusual behavior indicative of exploitation attempts. 6. In environments where immediate patching is not feasible, consider disabling or reconfiguring Segment Routing to LDP interworking or the leaking of SRMS entries with the "S" flag as a temporary workaround, after assessing operational impact. 7. Maintain an incident response plan that includes procedures for rapid recovery from routing daemon crashes to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd767e

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:11:33 AM

Last updated: 7/31/2025, 4:36:12 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats