CVE-2022-22249: Denial of Service (DoS) in Juniper Networks Junos OS
An Improper Control of a Resource Through its Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). When there is a continuous mac move a memory corruption causes one or more FPCs to crash and reboot. These MAC moves can be between two local interfaces or between core/EVPN and local interface. The below error logs can be seen in PFE syslog when this issue happens: xss_event_handler(1071): EA[0:0]_PPE 46.xss[0] ADDR Error. ppe_error_interrupt(4298): EA[0:0]_PPE 46 Errors sync xtxn error xss_event_handler(1071): EA[0:0]_PPE 1.xss[0] ADDR Error. ppe_error_interrupt(4298): EA[0:0]_PPE 1 Errors sync xtxn error xss_event_handler(1071): EA[0:0]_PPE 2.xss[0] ADDR Error. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 15.1R7-S13; 19.1 versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2.
AI Analysis
Technical Summary
CVE-2022-22249 is a vulnerability in the Packet Forwarding Engine (PFE) component of Juniper Networks Junos OS running on MX Series routers. The flaw arises from improper control of a resource through its lifetime, specifically triggered by continuous MAC address moves between interfaces. This causes memory corruption within the PFE, leading to one or more Flexible PIC Concentrators (FPCs) crashing and rebooting. The vulnerability can be exploited by an unauthenticated attacker with adjacent network access, meaning the attacker must be on the same Layer 2 broadcast domain or physically connected network segment. The attack involves generating continuous MAC address moves either between two local interfaces or between core/EVPN and local interfaces, which triggers the memory corruption. The resulting Denial of Service (DoS) condition disrupts normal router operations by causing PFE crashes and reboots, impacting network availability. The vulnerability affects a wide range of Junos OS versions on MX Series devices, including all versions prior to 15.1R7-S13 and various 19.x, 20.x, and 21.x releases prior to their respective fixed versions. The issue is confirmed by specific error logs in the PFE syslog indicating address errors and PPE error interrupts. The CVSS v3.1 base score is 6.5 (medium severity) with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating the attack requires adjacent network access but no privileges or user interaction, and impacts availability only. No known exploits are reported in the wild as of the publication date. This vulnerability is classified under CWE-664 (Improper Control of a Resource Through its Lifetime).
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability and availability, particularly for those relying on Juniper MX Series routers for core or edge routing functions. A successful exploitation could cause intermittent or sustained outages due to PFE crashes and router reboots, disrupting critical business communications, data flows, and internet connectivity. This can affect service providers, enterprises, and government networks that depend on Juniper MX Series devices for high-performance routing. The denial of service could impact operational continuity, degrade network performance, and potentially lead to cascading failures in complex network topologies. Since the attack requires adjacent network access, internal threat actors or compromised devices within the same Layer 2 domain pose the greatest risk. The vulnerability does not affect confidentiality or integrity directly but can severely impact availability, which is critical for real-time services and business operations. European organizations with large-scale network deployments or those in sectors such as telecommunications, finance, and critical infrastructure are particularly vulnerable to operational disruptions caused by this flaw.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Identify all Juniper MX Series routers running affected Junos OS versions by auditing network device inventories and firmware versions. 2) Prioritize patching by upgrading affected devices to the fixed Junos OS versions as listed by Juniper, ensuring that all MX Series routers are updated to versions at or beyond the fixed releases (e.g., 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7 or later). 3) Implement network segmentation and access controls to restrict Layer 2 adjacency to trusted devices only, minimizing the risk of an attacker gaining adjacent network access. 4) Monitor PFE syslogs and router error messages for signs of the described address errors and PPE error interrupts that indicate exploitation attempts or instability. 5) Employ network anomaly detection systems to identify unusual MAC move patterns that could signal an attack. 6) Conduct regular network hygiene practices, including limiting unnecessary MAC address mobility and validating network topology changes to reduce attack surface. 7) Engage with Juniper support and subscribe to security advisories to stay informed about any updates or additional mitigations. These steps go beyond generic advice by focusing on device-specific patching, network architecture adjustments, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2022-22249: Denial of Service (DoS) in Juniper Networks Junos OS
Description
An Improper Control of a Resource Through its Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). When there is a continuous mac move a memory corruption causes one or more FPCs to crash and reboot. These MAC moves can be between two local interfaces or between core/EVPN and local interface. The below error logs can be seen in PFE syslog when this issue happens: xss_event_handler(1071): EA[0:0]_PPE 46.xss[0] ADDR Error. ppe_error_interrupt(4298): EA[0:0]_PPE 46 Errors sync xtxn error xss_event_handler(1071): EA[0:0]_PPE 1.xss[0] ADDR Error. ppe_error_interrupt(4298): EA[0:0]_PPE 1 Errors sync xtxn error xss_event_handler(1071): EA[0:0]_PPE 2.xss[0] ADDR Error. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 15.1R7-S13; 19.1 versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2.
AI-Powered Analysis
Technical Analysis
CVE-2022-22249 is a vulnerability in the Packet Forwarding Engine (PFE) component of Juniper Networks Junos OS running on MX Series routers. The flaw arises from improper control of a resource through its lifetime, specifically triggered by continuous MAC address moves between interfaces. This causes memory corruption within the PFE, leading to one or more Flexible PIC Concentrators (FPCs) crashing and rebooting. The vulnerability can be exploited by an unauthenticated attacker with adjacent network access, meaning the attacker must be on the same Layer 2 broadcast domain or physically connected network segment. The attack involves generating continuous MAC address moves either between two local interfaces or between core/EVPN and local interfaces, which triggers the memory corruption. The resulting Denial of Service (DoS) condition disrupts normal router operations by causing PFE crashes and reboots, impacting network availability. The vulnerability affects a wide range of Junos OS versions on MX Series devices, including all versions prior to 15.1R7-S13 and various 19.x, 20.x, and 21.x releases prior to their respective fixed versions. The issue is confirmed by specific error logs in the PFE syslog indicating address errors and PPE error interrupts. The CVSS v3.1 base score is 6.5 (medium severity) with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating the attack requires adjacent network access but no privileges or user interaction, and impacts availability only. No known exploits are reported in the wild as of the publication date. This vulnerability is classified under CWE-664 (Improper Control of a Resource Through its Lifetime).
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability and availability, particularly for those relying on Juniper MX Series routers for core or edge routing functions. A successful exploitation could cause intermittent or sustained outages due to PFE crashes and router reboots, disrupting critical business communications, data flows, and internet connectivity. This can affect service providers, enterprises, and government networks that depend on Juniper MX Series devices for high-performance routing. The denial of service could impact operational continuity, degrade network performance, and potentially lead to cascading failures in complex network topologies. Since the attack requires adjacent network access, internal threat actors or compromised devices within the same Layer 2 domain pose the greatest risk. The vulnerability does not affect confidentiality or integrity directly but can severely impact availability, which is critical for real-time services and business operations. European organizations with large-scale network deployments or those in sectors such as telecommunications, finance, and critical infrastructure are particularly vulnerable to operational disruptions caused by this flaw.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Identify all Juniper MX Series routers running affected Junos OS versions by auditing network device inventories and firmware versions. 2) Prioritize patching by upgrading affected devices to the fixed Junos OS versions as listed by Juniper, ensuring that all MX Series routers are updated to versions at or beyond the fixed releases (e.g., 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7 or later). 3) Implement network segmentation and access controls to restrict Layer 2 adjacency to trusted devices only, minimizing the risk of an attacker gaining adjacent network access. 4) Monitor PFE syslogs and router error messages for signs of the described address errors and PPE error interrupts that indicate exploitation attempts or instability. 5) Employ network anomaly detection systems to identify unusual MAC move patterns that could signal an attack. 6) Conduct regular network hygiene practices, including limiting unnecessary MAC address mobility and validating network topology changes to reduce attack surface. 7) Engage with Juniper support and subscribe to security advisories to stay informed about any updates or additional mitigations. These steps go beyond generic advice by focusing on device-specific patching, network architecture adjustments, and proactive monitoring tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2021-12-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd78b2
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 2:10:04 AM
Last updated: 8/17/2025, 7:21:10 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.