An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated networked attacker to cause a flowprocessing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue can occur in a scenario where the SIP ALG is enabled and specific SIP messages are being processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA11281 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Jan 2022, 18:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Juniper mx10016
Juniper mx2010 Juniper srx550 Hm Juniper mx960 Juniper mx2008 Juniper srx340 Juniper junos Juniper mx2020 Juniper srx4000 Juniper mx40 Juniper srx5400 Juniper srx3400 Juniper srx550 Juniper mx5 Juniper srx110 Juniper srx380 Juniper srx650 Juniper srx210 Juniper srx5000 Juniper srx5800 Juniper srx240h2 Juniper srx3600 Juniper mx80 Juniper srx1500 Juniper mx10 Juniper srx240 Juniper srx320 Juniper srx550m Juniper mx204 Juniper mx150 Juniper mx480 Juniper srx4100 Juniper srx4600 Juniper mx104 Juniper srx345 Juniper srx5600 Juniper Juniper mx10003 Juniper srx100 Juniper srx1400 Juniper srx4200 Juniper srx220 Juniper mx10000 Juniper mx10008 Juniper srx300 Juniper mx240 |
|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
References | (CONFIRM) https://kb.juniper.net/JSA11281 - Vendor Advisory | |
CPE | cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:* cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* |
19 Jan 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-19 01:15
Updated : 2023-12-10 14:09
NVD link : CVE-2022-22175
Mitre link : CVE-2022-22175
CVE.ORG link : CVE-2022-22175
JSON object : View
Products Affected
juniper
- mx80
- mx2008
- srx3400
- mx10008
- srx300
- srx240h2
- srx1500
- srx5600
- srx5400
- srx320
- mx960
- mx2010
- srx100
- srx240
- srx550
- mx10
- srx5000
- srx4000
- mx104
- srx380
- srx4600
- srx5800
- mx40
- srx210
- srx3600
- mx150
- mx5
- junos
- srx1400
- srx550_hm
- mx10003
- srx345
- mx204
- srx340
- srx110
- srx4100
- mx10000
- mx10016
- srx4200
- mx2020
- mx240
- srx650
- srx220
- mx480
- srx550m
CWE
CWE-667
Improper Locking