First published: Wed Jul 20 2022(Updated: )
An Incorrect Comparison vulnerability in PFE of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS). On QFX5000 Series, and EX4600 and EX4650 platforms, the fxpc process will crash followed by the FPC reboot upon receipt of a specific hostbound packet. Continued receipt of these specific packets will create a sustained Denial of Service (DoS) condition. This issue only affects Juniper Networks Junos OS 19.4 version 19.4R3-S4.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =19.4-r3-s4 | |
Juniper EX4600 | ||
Juniper Ex4650 | ||
Juniper Qfx5100 | ||
Juniper Qfx5110 | ||
Juniper Qfx5120 | ||
Juniper Qfx5130 | ||
Juniper Qfx5200 | ||
Juniper Qfx5210 | ||
Juniper Qfx5220 | ||
Juniper Qfx5700 |
The following software releases have been updated to resolve this specific issue: 19.4R3-S5, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22203 is an Incorrect Comparison vulnerability in PFE of Juniper Networks Junos OS that allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS).
Juniper JUNOS version 19.4-r3-s4 is affected by CVE-2022-22203.
CVE-2022-22203 has a severity level of medium.
To fix CVE-2022-22203, it is recommended to apply the necessary updates or patches provided by Juniper Networks.
You can find more information about CVE-2022-22203 on the Juniper Networks knowledge base at https://kb.juniper.net/JSA69707.