Versio.io

CVE-2022-22155

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 19-01-2022 02:15
Last modified: - 26-01-2022 05:04
Total changes: - 2

Description

An Uncontrolled Resource Consumption vulnerability in the handling of IPv6 neighbor state change events in Juniper Networks Junos OS allows an adjacent attacker to cause a memory leak in the Flexible PIC Concentrator (FPC) of an ACX5448 router. The continuous flapping of an IPv6 neighbor with specific timing will cause the FPC to run out of resources, leading to a Denial of Service (DoS) condition. Once the condition occurs, further packet processing will be impacted, creating a sustained Denial of Service (DoS) condition, requiring a manual PFE restart to restore service. The following error messages will be seen after the FPC resources have been exhausted: fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 This issue only affects the ACX5448 router. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS on ACX5448: 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S8, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Adjacent
Attack vector
High
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
6.5
Base score
2.8
3.6
Exploitability score
Impact score
 

Verification logic

AND
OR
vendor=juniper AND product=junos AND version=18.4 AND update=-
vendor=juniper AND product=junos AND version=18.4 AND update=r1
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s1
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s2
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s3
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s4
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s5
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s6
vendor=juniper AND product=junos AND version=18.4 AND update=r1-s7
vendor=juniper AND product=junos AND version=18.4 AND update=r2
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s1
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s2
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s3
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s4
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s5
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s6
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s7
vendor=juniper AND product=junos AND version=18.4 AND update=r2-s8
vendor=juniper AND product=junos AND version=18.4 AND update=r3
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s1
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s2
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s3
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s4
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s5
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s6
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s7
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s8
vendor=juniper AND product=junos AND version=18.4 AND update=r3-s9
vendor=juniper AND product=junos AND version=19.1 AND update=-
vendor=juniper AND product=junos AND version=19.1 AND update=r1
vendor=juniper AND product=junos AND version=19.1 AND update=r1-s1
vendor=juniper AND product=junos AND version=19.1 AND update=r1-s2
vendor=juniper AND product=junos AND version=19.1 AND update=r1-s3
vendor=juniper AND product=junos AND version=19.1 AND update=r1-s4
vendor=juniper AND product=junos AND version=19.1 AND update=r1-s5
vendor=juniper AND product=junos AND version=19.1 AND update=r1-s6
vendor=juniper AND product=junos AND version=19.1 AND update=r2
vendor=juniper AND product=junos AND version=19.1 AND update=r2-s1
vendor=juniper AND product=junos AND version=19.1 AND update=r2-s2
vendor=juniper AND product=junos AND version=19.1 AND update=r2-s3
vendor=juniper AND product=junos AND version=19.1 AND update=r3
vendor=juniper AND product=junos AND version=19.1 AND update=r3-s1
vendor=juniper AND product=junos AND version=19.1 AND update=r3-s2
vendor=juniper AND product=junos AND version=19.1 AND update=r3-s3
vendor=juniper AND product=junos AND version=19.1 AND update=r3-s4
vendor=juniper AND product=junos AND version=19.2 AND update=-
vendor=juniper AND product=junos AND version=19.2 AND update=r1
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s1
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s2
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s3
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s4
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s5
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s6
vendor=juniper AND product=junos AND version=19.2 AND update=r1-s7
vendor=juniper AND product=junos AND version=19.2 AND update=r2
vendor=juniper AND product=junos AND version=19.2 AND update=r2-s1
vendor=juniper AND product=junos AND version=19.2 AND update=r3
vendor=juniper AND product=junos AND version=19.2 AND update=r3-s1
vendor=juniper AND product=junos AND version=19.3 AND update=-
vendor=juniper AND product=junos AND version=19.3 AND update=r1
vendor=juniper AND product=junos AND version=19.3 AND update=r1-s1
vendor=juniper AND product=junos AND version=19.3 AND update=r2
vendor=juniper AND product=junos AND version=19.3 AND update=r2-s1
vendor=juniper AND product=junos AND version=19.3 AND update=r2-s2
vendor=juniper AND product=junos AND version=19.3 AND update=r2-s3
vendor=juniper AND product=junos AND version=19.3 AND update=r2-s4
vendor=juniper AND product=junos AND version=19.3 AND update=r2-s5
vendor=juniper AND product=junos AND version=19.3 AND update=r3
vendor=juniper AND product=junos AND version=19.3 AND update=r3-s1
vendor=juniper AND product=junos AND version=19.4 AND update=r1
vendor=juniper AND product=junos AND version=19.4 AND update=r1-s1
vendor=juniper AND product=junos AND version=19.4 AND update=r1-s2
vendor=juniper AND product=junos AND version=19.4 AND update=r2
vendor=juniper AND product=junos AND version=19.4 AND update=r2-s1
vendor=juniper AND product=junos AND version=20.1 AND update=r1
vendor=juniper AND product=junos AND version=20.1 AND update=r1-s1
vendor=juniper AND product=junos AND version=20.1 AND update=r1-s2
vendor=juniper AND product=junos AND version=20.1 AND update=r1-s3
vendor=juniper AND product=junos AND version=20.1 AND update=r1-s4
vendor=juniper AND product=junos AND version=20.2 AND update=r1
OR
vendor=juniper AND product=acx5448 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-22155

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.