An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Networks Junos OS Evolved ACX7000 Series allows partial Denial of Service. Learn the impact, affected systems, and mitigation steps.
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS) by sending specific IPv6 transit traffic to the Routing Engine (RE), leading to increased CPU utilization of the RE.
Understanding CVE-2022-22227
This CVE affects Junos OS Evolved on ACX7000 Series, impacting specific models and versions due to mishandling of IPv6 transit traffic, resulting in a partial Denial of Service.
What is CVE-2022-22227?
It is a vulnerability in Juniper Networks Junos OS Evolved on ACX7000 Series where specific IPv6 transit traffic is exceptioned to the routing engine, causing heightened CPU usage and potentially resulting in a partial Denial of Service when exploited by an unauthenticated network-based attacker.
The Impact of CVE-2022-22227
The vulnerability allows attackers to disrupt services by overwhelming the Routing Engine with IPv6 transit traffic, leading to increased CPU utilization and affecting the availability of services on affected devices, specifically ACX7100-48L, ACX7100-32C, and ACX7509 models.
Technical Details of CVE-2022-22227
Vulnerability Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series.
Affected Systems and Versions
Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO to 21.4R2-EVO, excluding specified fixed versions.
Exploitation Mechanism
Unauthenticated attackers can exploit the vulnerability by sending specific IPv6 transit traffic, causing partial Denial of Service by increasing CPU utilization of the Routing Engine.
Mitigation and Prevention
Immediate Steps to Take
Update to the specified fixed software releases: 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, or later.
Long-Term Security Practices
Regularly monitor and apply security updates provided by Juniper Networks to ensure system integrity and protection against known vulnerabilities.
Patching and Updates
Refer to Juniper's advisory JSA69878 for detailed information on applying software updates to mitigate the CVE-2022-22227 vulnerability.