CVE-2022-22236

CVSS V2 None CVSS V3 High 7.5
Description
An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When specific valid SIP packets are received the PFE will crash and restart. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
Overview
  • CVE ID
  • CVE-2022-22236
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-10-18T03:15:10
  • Last Modified Date
  • 2022-10-21T18:38:25
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* 0 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://kb.juniper.net/JSA69892
History
Created Old Value New Value Data Type Notes
2022-10-18 04:00:18 Added to TrackCVE
2022-12-07 08:40:52 2022-10-18T03:15Z 2022-10-18T03:15:10 CVE Published Date updated
2022-12-07 08:40:52 2022-10-21T18:38:25 CVE Modified Date updated
2022-12-07 08:40:52 Analyzed Vulnerability Status updated