CVE-2022-22153

HIGH

Juniper Networks Junos OS - Info Disclosure

Title source: llm
STIX 2.1

Description

An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss. If transit traffic includes a significant percentage (> 5%) of fragmented packets which need to be reassembled, high latency or packet drops might be observed. This issue affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3: All versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2-S9, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2.

Scores

CVSS v3 7.5
EPSS 0.0039
EPSS Percentile 60.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-407 CWE-770
Status published
Products (4)
juniper/junos 18.2 (17 CPE variants)
juniper/junos 18.3 (14 CPE variants)
juniper/junos 18.4 (18 CPE variants)
juniper/junos 19.1
Published Jan 19, 2022
Tracked Since Feb 18, 2026