Executive Summary

Informations
Name CVE-2022-22216 First vendor Publication 2022-07-20
Vendor Cve Last vendor Modification 2022-07-29

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Overall CVSS Score 4.3
Base Score 4.3 Environmental Score 4.3
impact SubScore 1.4 Temporal Score 4.3
Exploitabality Sub Score 2.8
 
Attack Vector Adjacent Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the PFE of Juniper Networks Junos OS on PTX Series and QFX10k Series allows an adjacent unauthenticated attacker to gain access to sensitive information. PTX1000 and PTX10000 Series, and QFX10000 Series and PTX5000 Series devices sometimes do not reliably pad Ethernet packets, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak' and often detected as CVE-2003-0001. This issue affects: Juniper Networks Junos OS on PTX1000 and PTX10000 Series: All versions prior to 18.4R3-S11; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R2-S5, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. Juniper Networks Junos OS on QFX10000 Series and PTX5000 Series: All versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22216

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Hardware 1
Os 937

Sources (Detail)

Source Url
CONFIRM https://kb.juniper.net/JSA69720

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2024-08-02 13:33:08
  • Multiple Updates
2024-08-02 01:28:31
  • Multiple Updates
2024-02-02 02:32:09
  • Multiple Updates
2024-02-01 12:26:11
  • Multiple Updates
2023-09-05 13:26:32
  • Multiple Updates
2023-09-05 01:25:38
  • Multiple Updates
2023-09-02 13:24:53
  • Multiple Updates
2023-09-02 01:26:02
  • Multiple Updates
2023-08-12 13:31:09
  • Multiple Updates
2023-08-12 01:25:17
  • Multiple Updates
2023-08-11 13:23:09
  • Multiple Updates
2023-08-11 01:26:06
  • Multiple Updates
2023-08-06 13:20:53
  • Multiple Updates
2023-08-06 01:25:00
  • Multiple Updates
2023-08-04 13:21:18
  • Multiple Updates
2023-08-04 01:25:21
  • Multiple Updates
2023-07-28 02:11:15
  • Multiple Updates
2023-07-14 13:21:20
  • Multiple Updates
2023-07-14 01:25:07
  • Multiple Updates
2023-03-29 02:23:15
  • Multiple Updates
2023-03-28 12:25:18
  • Multiple Updates
2022-10-11 13:12:16
  • Multiple Updates
2022-10-11 01:24:35
  • Multiple Updates
2022-08-25 02:07:29
  • Multiple Updates
2022-07-30 09:27:23
  • Multiple Updates
2022-07-30 05:27:21
  • Multiple Updates
2022-07-20 21:27:10
  • First insertion