CVE-2022-22198

HIGH

Juniper Networks Junos OS - DoS

Title source: llm
STIX 2.1

Description

An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1.

Scores

CVSS v3 7.5
EPSS 0.0052
EPSS Percentile 66.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-824
Status published
Products (3)
juniper/junos 20.4 r1 (5 CPE variants)
juniper/junos 21.1 r1 (3 CPE variants)
juniper/junos 21.2 r1 (3 CPE variants)
Published Apr 14, 2022
Tracked Since Feb 18, 2026