CVE-2022-22201

HIGH

Juniper Networks Junos OS - DoS

Title source: llm
STIX 2.1

Description

An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). On SRX5000 Series with SPC3, SRX4000 Series, and vSRX, when PowerMode IPsec is configured and a malformed ESP packet matching an established IPsec tunnel is received the PFE crashes. This issue affects Juniper Networks Junos OS on SRX5000 Series with SPC3, SRX4000 Series, and vSRX: All versions prior to 19.4R2-S6, 19.4R3-S7; 20.1 versions prior to 20.1R3-S3; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R1-S2, 21.3R2.

Scores

CVSS v3 7.5
EPSS 0.0045
EPSS Percentile 63.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-1285 CWE-20
Status published
Products (5)
juniper/junos 19.4 (13 CPE variants)
juniper/junos 20.1 (12 CPE variants)
juniper/junos 20.2 (13 CPE variants)
juniper/junos 20.3 (9 CPE variants)
juniper/junos 20.4 (3 CPE variants)
Published Oct 18, 2022
Tracked Since Feb 18, 2026