Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2022-22217 | First vendor Publication | 2022-07-20 |
Vendor | Cve | Last vendor Modification | 2022-07-29 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 6.5 | ||
Base Score | 6.5 | Environmental Score | 6.5 |
impact SubScore | 3.6 | Temporal Score | 6.5 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Adjacent | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS). The issue is caused by malformed MLD packets looping on a multi-homed Ethernet Segment Identifier (ESI) when VXLAN is configured. These MLD packets received on a multi-homed ESI are sent to the peer, and then incorrectly forwarded out the same ESI, violating the split horizon rule. This issue only affects QFX10K Series switches, including the QFX10002, QFX10008, and QFX10016. Other products and platforms are unaffected by this vulnerability. This issue affects Juniper Networks Junos OS on QFX10K Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R2. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22217 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-754 | Improper Check for Unusual or Exceptional Conditions |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
CONFIRM | https://kb.juniper.net/JSA69721 |
Alert History
Date | Informations |
---|---|
2024-08-02 13:33:08 |
|
2024-08-02 01:28:31 |
|
2024-02-02 02:32:09 |
|
2024-02-01 12:26:11 |
|
2023-09-05 13:26:32 |
|
2023-09-05 01:25:38 |
|
2023-09-02 13:24:53 |
|
2023-09-02 01:26:02 |
|
2023-08-12 13:31:09 |
|
2023-08-12 01:25:17 |
|
2023-08-11 13:23:09 |
|
2023-08-11 01:26:07 |
|
2023-08-06 13:20:53 |
|
2023-08-06 01:25:00 |
|
2023-08-04 13:21:18 |
|
2023-08-04 01:25:22 |
|
2023-07-28 02:11:15 |
|
2023-07-14 13:21:20 |
|
2023-07-14 01:25:08 |
|
2023-03-29 02:23:15 |
|
2023-03-28 12:25:18 |
|
2022-10-11 13:12:16 |
|
2022-10-11 01:24:36 |
|
2022-08-25 02:07:29 |
|
2022-07-30 09:27:23 |
|
2022-07-29 21:27:22 |
|
2022-07-21 05:27:13 |
|
2022-07-20 21:27:10 |
|