Skip to main content

CVE-2022-22240: Denial of Service (DoS) in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2022-22240cvecve-2022-22240cwe-770cwe-401
Published: Tue Oct 18 2022 (10/18/2022, 02:46:42 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with rib-sharding enabled, two issues may occur when executing a specific CLI command. One is a memory leak issue with rpd where the leak rate is not constant, and the other is a temporary spike in rpd memory usage during command execution. This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R1-S2-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1.

AI-Powered Analysis

AILast updated: 07/05/2025, 01:55:15 UTC

Technical Analysis

CVE-2022-22240 is a vulnerability identified in the routing protocol daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. This vulnerability arises from two related issues: an allocation of resources without limits or throttling (CWE-770) and a missing release of memory after its effective lifetime (CWE-401). Specifically, in environments where Border Gateway Protocol (BGP) routing is highly scaled and rib-sharding is enabled, executing a particular CLI command can trigger a memory leak in the rpd process. The leak rate is variable and not constant, leading to a gradual depletion of available memory resources. Additionally, there is a temporary spike in memory usage during the execution of the command. The consequence of these issues is a Denial of Service (DoS) condition, as the rpd process may exhaust system memory, degrade performance, or crash, disrupting routing functions. The vulnerability requires local authentication with low privileges and does not require user interaction, making it exploitable by insiders or attackers who have gained limited access to the device. It affects multiple versions of Junos OS from 19.4 up to 21.3, including various subversions and Junos OS Evolved versions prior to specified patches. Notably, versions prior to 19.2R1 are not affected. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the local attack vector, low complexity, low privileges required, no user interaction, and impact limited to availability without affecting confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no direct patch links were provided in the source information, though Juniper has released fixed versions as indicated by the affected version ranges.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure stability, particularly for large ISPs, data centers, and enterprises relying on Juniper routers running affected Junos OS versions in high-scale BGP environments with rib-sharding enabled. A successful exploitation could lead to denial of routing services, causing network outages, degraded connectivity, and potential cascading failures in dependent systems. This can disrupt critical business operations, impact service level agreements, and result in financial losses. Since the attack requires local authenticated access, the threat is heightened in environments where internal threat actors or compromised credentials exist. Given the reliance on Juniper networking equipment in European telecommunications and enterprise networks, the vulnerability could affect backbone routing and inter-domain routing, impacting internet service continuity and enterprise WAN connectivity. The temporary memory spikes and leaks could also complicate incident response and recovery, requiring device reboots or manual intervention, which may not be feasible in all operational contexts.

Mitigation Recommendations

European organizations should prioritize upgrading affected Junos OS and Junos OS Evolved devices to the fixed versions specified by Juniper Networks, ensuring they are running versions at or beyond 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, or their equivalents in Junos OS Evolved. In addition, organizations should implement strict access controls to limit local authenticated access to trusted personnel only, employing multi-factor authentication and robust credential management to reduce the risk of insider threats or credential compromise. Monitoring memory usage patterns on rpd processes can help detect abnormal spikes indicative of exploitation attempts. Network segmentation and role-based access control (RBAC) on management interfaces can further reduce exposure. Regularly auditing device configurations to disable unnecessary CLI commands or restrict their use can mitigate attack vectors. Finally, organizations should maintain up-to-date incident response plans that include procedures for handling DoS conditions on routing devices, including safe reboot strategies and failover configurations to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2021-12-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd77f8

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 1:55:15 AM

Last updated: 7/25/2025, 4:47:47 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats