Learn about CVE-2022-22236 impacting Juniper Networks Junos OS on SRX Series and MX Series. Find out how unauthenticated attackers can trigger a crash and Denial of Service (DoS) with specific SIP packets.
An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS) by crashing the PFE when specific valid SIP packets are received.
Understanding CVE-2022-22236
This vulnerability affects Juniper Networks Junos OS on SRX Series and MX Series versions prior to specific releases, leading to a DoS condition.
What is CVE-2022-22236?
Affects Junos OS on SRX Series and MX Series allowing an unauthenticated attacker to crash the PFE with specific SIP packets.
The Impact of CVE-2022-22236
The vulnerability allows unauthenticated attackers to perform DoS attacks, impacting the availability of affected systems.
Technical Details of CVE-2022-22236
The vulnerability description, affected systems and versions, and exploitation mechanism are discussed below:
Vulnerability Description
An Access of Uninitialized Pointer in SIP ALG of Juniper Networks Junos OS leads to a DoS condition on SRX Series and MX Series.
Affected Systems and Versions
Impacts Junos OS on SRX Series and MX Series versions prior to specific releases (20.4, 21.1, 21.2, 21.3, 21.4, 22.1).
Exploitation Mechanism
The vulnerability can be exploited by sending specific valid SIP packets causing the PFE to crash and restart.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-22236, consider the following steps:
Immediate Steps to Take
Verify SIP ALG status, consider available workarounds, and apply necessary patches provided by Juniper Networks.
Long-Term Security Practices
Regularly update and monitor your network infrastructure, apply security best practices, and stay informed about potential vulnerabilities.
Patching and Updates
Install the following software releases to address the issue: 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2.
For more detailed information, refer to the Juniper Networks advisory (JSA69892).