CVE-2022-22234: CWE-1250 Improper Preservation of Consistency Between Independent Representations of Shared State in Juniper Networks Junos OS
An Improper Preservation of Consistency Between Independent Representations of Shared State vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). If the device is very busy for example while executing a series of show commands on the CLI one or more SFPs might not be detected anymore. The system then changes its state to "unplugged" which is leading to traffic impact and at least a partial DoS. Once the system is less busy the port states return to their actual value. Indicators of compromise are log messages about unplugged SFPs and corresponding syspld messages without any physical or environmental cause. These can be checked by issuing the following commands: user@device# show log messages | match unplugged %PFE-6: fpc0 sfp-0/1/2 SFP unplugged %PFE-6: fpc0 sfp-0/1/3 SFP unplugged The following log messages will also be seen when this issue happens: fpc0 Error tvp_drv_syspld_read: syspld read failed for address <address> fpc0 Error[-1]:tvp_optics_presence_get - Syspld read failed for port <pic/port> fpc0 optics pres failed(-1) for pic <pic> port <port> fpc0 tvp_drv_syspld_read: i2c access retry count 200 This issue affects Juniper Networks Junos OS on EX2300 Series, EX3400 Series: All versions prior to 18.4R3-S11; 19.1 versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
AI Analysis
Technical Summary
CVE-2022-22234 is a medium-severity vulnerability affecting Juniper Networks Junos OS, specifically within the Packet Forwarding Engine (PFE) component. The vulnerability arises from improper preservation of consistency between independent representations of shared state (CWE-1250). In practical terms, this means that under certain conditions, the system's internal state about the presence of Small Form-factor Pluggable (SFP) transceivers can become inconsistent with the actual hardware state. This inconsistency is triggered when the device is under heavy load, such as during the execution of multiple CLI 'show' commands. The system may incorrectly mark one or more SFP ports as "unplugged," even though they remain physically connected. This state change leads to traffic disruption and at least a partial Denial of Service (DoS) because the network device treats those ports as inactive. Once the device load decreases, the port states revert to their correct values. Indicators of this issue include specific log messages referencing unplugged SFPs and syspld read failures, which can be monitored via CLI commands. The vulnerability affects a wide range of Junos OS versions on EX2300 and EX3400 Series switches, spanning versions prior to 18.4R3-S11 through 21.4R2. Exploitation requires local authentication with low privileges, no user interaction is needed, and the attack vector is local. The CVSS v3.1 base score is 5.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network availability and operational continuity. Juniper EX2300 and EX3400 Series switches are commonly deployed in enterprise and service provider networks across Europe for access and aggregation layers. A partial or full DoS on these devices can disrupt critical business services, internal communications, and internet connectivity. In high-demand environments such as data centers, financial institutions, telecommunications providers, and government networks, even transient outages can have significant operational and financial consequences. The requirement for local authentication limits remote exploitation but insider threats or compromised administrative accounts could trigger the issue. Additionally, the intermittent nature of the DoS—triggered under heavy CLI usage—could complicate troubleshooting and incident response, potentially leading to prolonged outages or misdiagnosed hardware failures. The lack of impact on confidentiality and integrity reduces risks related to data breaches but does not diminish the operational risks associated with network downtime.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all affected Juniper EX2300 and EX3400 Series devices running vulnerable Junos OS versions. 2) Upgrade Junos OS to the fixed versions starting from 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, or 21.4R2 as applicable. 3) Limit the use of CLI 'show' commands or other heavy CLI operations during peak traffic periods to reduce the likelihood of triggering the issue. 4) Implement strict access controls and monitoring for local administrative accounts to prevent unauthorized or unnecessary CLI access. 5) Monitor device logs for the specific indicators of compromise such as "SFP unplugged" messages and syspld read errors to detect early signs of the vulnerability being triggered. 6) Establish incident response procedures to quickly identify and remediate partial DoS conditions caused by this issue. 7) Engage with Juniper support for any additional patches or workarounds if immediate upgrades are not feasible. These steps go beyond generic advice by focusing on operational practices and monitoring tailored to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2022-22234: CWE-1250 Improper Preservation of Consistency Between Independent Representations of Shared State in Juniper Networks Junos OS
Description
An Improper Preservation of Consistency Between Independent Representations of Shared State vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). If the device is very busy for example while executing a series of show commands on the CLI one or more SFPs might not be detected anymore. The system then changes its state to "unplugged" which is leading to traffic impact and at least a partial DoS. Once the system is less busy the port states return to their actual value. Indicators of compromise are log messages about unplugged SFPs and corresponding syspld messages without any physical or environmental cause. These can be checked by issuing the following commands: user@device# show log messages | match unplugged %PFE-6: fpc0 sfp-0/1/2 SFP unplugged %PFE-6: fpc0 sfp-0/1/3 SFP unplugged The following log messages will also be seen when this issue happens: fpc0 Error tvp_drv_syspld_read: syspld read failed for address <address> fpc0 Error[-1]:tvp_optics_presence_get - Syspld read failed for port <pic/port> fpc0 optics pres failed(-1) for pic <pic> port <port> fpc0 tvp_drv_syspld_read: i2c access retry count 200 This issue affects Juniper Networks Junos OS on EX2300 Series, EX3400 Series: All versions prior to 18.4R3-S11; 19.1 versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.
AI-Powered Analysis
Technical Analysis
CVE-2022-22234 is a medium-severity vulnerability affecting Juniper Networks Junos OS, specifically within the Packet Forwarding Engine (PFE) component. The vulnerability arises from improper preservation of consistency between independent representations of shared state (CWE-1250). In practical terms, this means that under certain conditions, the system's internal state about the presence of Small Form-factor Pluggable (SFP) transceivers can become inconsistent with the actual hardware state. This inconsistency is triggered when the device is under heavy load, such as during the execution of multiple CLI 'show' commands. The system may incorrectly mark one or more SFP ports as "unplugged," even though they remain physically connected. This state change leads to traffic disruption and at least a partial Denial of Service (DoS) because the network device treats those ports as inactive. Once the device load decreases, the port states revert to their correct values. Indicators of this issue include specific log messages referencing unplugged SFPs and syspld read failures, which can be monitored via CLI commands. The vulnerability affects a wide range of Junos OS versions on EX2300 and EX3400 Series switches, spanning versions prior to 18.4R3-S11 through 21.4R2. Exploitation requires local authentication with low privileges, no user interaction is needed, and the attack vector is local. The CVSS v3.1 base score is 5.5, reflecting a medium severity primarily due to the impact on availability without affecting confidentiality or integrity. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network availability and operational continuity. Juniper EX2300 and EX3400 Series switches are commonly deployed in enterprise and service provider networks across Europe for access and aggregation layers. A partial or full DoS on these devices can disrupt critical business services, internal communications, and internet connectivity. In high-demand environments such as data centers, financial institutions, telecommunications providers, and government networks, even transient outages can have significant operational and financial consequences. The requirement for local authentication limits remote exploitation but insider threats or compromised administrative accounts could trigger the issue. Additionally, the intermittent nature of the DoS—triggered under heavy CLI usage—could complicate troubleshooting and incident response, potentially leading to prolonged outages or misdiagnosed hardware failures. The lack of impact on confidentiality and integrity reduces risks related to data breaches but does not diminish the operational risks associated with network downtime.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all affected Juniper EX2300 and EX3400 Series devices running vulnerable Junos OS versions. 2) Upgrade Junos OS to the fixed versions starting from 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, or 21.4R2 as applicable. 3) Limit the use of CLI 'show' commands or other heavy CLI operations during peak traffic periods to reduce the likelihood of triggering the issue. 4) Implement strict access controls and monitoring for local administrative accounts to prevent unauthorized or unnecessary CLI access. 5) Monitor device logs for the specific indicators of compromise such as "SFP unplugged" messages and syspld read errors to detect early signs of the vulnerability being triggered. 6) Establish incident response procedures to quickly identify and remediate partial DoS conditions caused by this issue. 7) Engage with Juniper support for any additional patches or workarounds if immediate upgrades are not feasible. These steps go beyond generic advice by focusing on operational practices and monitoring tailored to this vulnerability's characteristics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2021-12-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd77f2
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 1:54:49 AM
Last updated: 8/14/2025, 12:29:41 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.