Learn about CVE-2022-22240, a memory leak vulnerability in Juniper Networks Junos OS and Junos OS Evolved, allowing DoS attacks. Find out the impacted versions and recommended patches.
A memory leak vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved can be exploited by a locally authenticated attacker, leading to Denial of Service (DoS) in a BGP routing environment with rib-sharding enabled.
Understanding CVE-2022-22240
An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability can be exploited by executing a specific CLI command, causing memory leak and temporary spikes in memory usage.
What is CVE-2022-22240?
The vulnerability in rpd allows a low privileged attacker to trigger a DoS situation in Junos OS and Junos OS Evolved versions, impacting a range of affected systems.
The Impact of CVE-2022-22240
This vulnerability has a CVSS base score of 5.5, with a medium severity level. It can result in significant availability impact when exploited.
Technical Details of CVE-2022-22240
Vulnerability Description
The vulnerability in the routing protocol daemon can lead to memory leak issues and temporary spikes in memory usage during command execution in high-scaled BGP routing environment with rib-sharding enabled.
Affected Systems and Versions
Juniper Networks Junos OS versions 19.4 to 21.3 and Junos OS Evolved versions prior to specific releases are affected by this vulnerability.
Exploitation Mechanism
To exploit this vulnerability, a device needs to be configured with BGP rib-sharding as specified, allowing a locally authenticated low privileged attacker to trigger a DoS situation.
Mitigation and Prevention
Immediate Steps to Take
Update the affected software to the patched versions provided by Juniper Networks to mitigate this vulnerability.
Long-Term Security Practices
Employ access lists or firewall filters to restrict access to trusted entities and reduce the risk of exploitation of this vulnerability.
Patching and Updates
The recommended software releases that address this vulnerability are available for both Junos OS and Junos OS Evolved, ensuring comprehensive protection against memory leak issues.