A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged attacker to cause Denial of Service (DoS). Continuously polling the SNMP jnxCosQstatTable causes the FPC to run out of GUID space, causing a Denial of Service to the FPC resources. When the FPC runs out of the GUID space, you will see the following syslog messages. The evo-aftmand-bt process is asserting. fpc1 evo-aftmand-bt[17556]: %USER-3: get_next_guid: Ran out of Guid Space start 1748051689472 end 1752346656767 fpc1 audit[17556]: %AUTH-5: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17556 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=6 fpc1 kernel: %KERN-5: audit: type=1701 audit(1648567505.119:57): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17556 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=6 fpc1 emfd-fpa[14438]: %USER-5: Alarm set: APP color=red, class=CHASSIS, reason=Application evo-aftmand-bt fail on node Fpc1 fpc1 emfd-fpa[14438]: %USER-3-EMF_FPA_ALARM_REP: RaiseAlarm: Alarm(Location: /Chassis[0]/Fpc[1] Module: sysman Object: evo-aftmand-bt:0 Error: 2) reported fpc1 sysepochman[12738]: %USER-5-SYSTEM_REBOOT_EVENT: Reboot [node] [ungraceful reboot] [evo-aftmand-bt exited] The FPC resources can be monitored using the following commands: user@router> start shell [vrf:none] user@router-re0:~$ cli -c "show platform application-info allocations app evo-aftmand-bt" | grep ^fpc | grep -v Route | grep -i -v Nexthop | awk '{total[$1] += $5} END { for (key in total) { print key " " total[key]/4294967296 }}' Once the FPCs become unreachable they must be manually restarted as they do not self-recover. This issue affects Juniper Networks Junos OS Evolved on PTX Series: All versions prior to 20.4R3-S4-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO version 21.2R1-EVO and later versions; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA69916 | Permissions Required |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Oct 2022, 18:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10000:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:* cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx100016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:* |
|
First Time |
Juniper ptx10001-36mr
Juniper ptx10003 160c Juniper ptx10003 Juniper ptx10003 81cd Juniper ptx10008 Juniper ptx1000 Juniper ptx5000 Juniper ptx10002-60c Juniper ptx10016 Juniper ptx10002 Juniper junos Os Evolved Juniper Juniper ptx3000 Juniper ptx1000-72q Juniper ptx100016 Juniper ptx10004 Juniper ptx10003 80c Juniper ptx10001 Juniper ptx10000 |
|
CWE | CWE-770 | |
References | (CONFIRM) https://kb.juniper.net/JSA69916 - Permissions Required |
18 Oct 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-18 03:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-22211
Mitre link : CVE-2022-22211
CVE.ORG link : CVE-2022-22211
JSON object : View
Products Affected
juniper
- junos_os_evolved
- ptx3000
- ptx10004
- ptx1000
- ptx10003_80c
- ptx10003_81cd
- ptx100016
- ptx10000
- ptx10003
- ptx10008
- ptx1000-72q
- ptx10016
- ptx10002-60c
- ptx5000
- ptx10001-36mr
- ptx10003_160c
- ptx10001
- ptx10002
CWE
CWE-770
Allocation of Resources Without Limits or Throttling