CWE
401 770
Advisory Published
Updated

CVE-2022-22240: Junos OS and Junos OS Evolved: An rpd memory leak might be observed while running a specific cli command in a RIB sharding scenario

First published: Tue Oct 18 2022(Updated: )

An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with rib-sharding enabled, two issues may occur when executing a specific CLI command. One is a memory leak issue with rpd where the leak rate is not constant, and the other is a temporary spike in rpd memory usage during command execution. This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R1-S2-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Junos=19.4
Juniper Junos=19.4-r1
Juniper Junos=19.4-r1-s1
Juniper Junos=19.4-r1-s2
Juniper Junos=19.4-r1-s3
Juniper Junos=19.4-r1-s4
Juniper Junos=19.4-r2
Juniper Junos=19.4-r2-s1
Juniper Junos=19.4-r2-s2
Juniper Junos=19.4-r2-s3
Juniper Junos=19.4-r2-s4
Juniper Junos=19.4-r2-s5
Juniper Junos=19.4-r2-s6
Juniper Junos=19.4-r3
Juniper Junos=19.4-r3-s1
Juniper Junos=19.4-r3-s2
Juniper Junos=19.4-r3-s3
Juniper Junos=19.4-r3-s4
Juniper Junos=19.4-r3-s5
Juniper Junos=19.4-r3-s6
Juniper Junos=19.4-r3-s7
Juniper Junos=19.4-r3-s8
Juniper Junos=20.2
Juniper Junos=20.2-r1
Juniper Junos=20.2-r1-s1
Juniper Junos=20.2-r1-s2
Juniper Junos=20.2-r1-s3
Juniper Junos=20.2-r2
Juniper Junos=20.2-r2-s1
Juniper Junos=20.2-r2-s2
Juniper Junos=20.2-r2-s3
Juniper Junos=20.2-r3
Juniper Junos=20.2-r3-s1
Juniper Junos=20.2-r3-s2
Juniper Junos=20.2-r3-s3
Juniper Junos=20.2-r3-s4
Juniper Junos=20.3
Juniper Junos=20.3-r1
Juniper Junos=20.3-r1-s1
Juniper Junos=20.3-r1-s2
Juniper Junos=20.3-r2
Juniper Junos=20.3-r2-s1
Juniper Junos=20.3-r3
Juniper Junos=20.3-r3-s1
Juniper Junos=20.4
Juniper Junos=20.4-r1
Juniper Junos=20.4-r1-s1
Juniper Junos=20.4-r2
Juniper Junos=20.4-r2-s1
Juniper Junos=20.4-r2-s2
Juniper Junos=20.4-r3
Juniper Junos=21.1
Juniper Junos=21.1-r1
Juniper Junos=21.1-r1-s1
Juniper Junos=21.1-r2
Juniper Junos=21.1-r2-s1
Juniper Junos=21.1-r2-s2
Juniper Junos=21.2
Juniper Junos=21.2-r1
Juniper Junos=21.2-r1-s1
Juniper Junos=21.2-r2
Juniper Junos=21.3
Juniper Junos=21.3-r1
Juniper Junos=21.3-r1-s1
Juniper Junos=21.3-r1-s2
Juniper Networks Junos OS<20.4
Juniper Networks Junos OS=20.4
Juniper Networks Junos OS=20.4-r1
Juniper Networks Junos OS=20.4-r1-s1
Juniper Networks Junos OS=20.4-r1-s2
Juniper Networks Junos OS=20.4-r2
Juniper Networks Junos OS=20.4-r2-s1
Juniper Networks Junos OS=20.4-r2-s2
Juniper Networks Junos OS=20.4-r2-s3
Juniper Networks Junos OS=20.4-r3
Juniper Networks Junos OS=21.1-r1
Juniper Networks Junos OS=21.1-r1-s1
Juniper Networks Junos OS=21.1-r2
Juniper Networks Junos OS=21.1-r3
Juniper Networks Junos OS=21.1-r3-s1
Juniper Networks Junos OS=21.2
Juniper Networks Junos OS=21.2-r1
Juniper Networks Junos OS=21.2-r1-s1
Juniper Networks Junos OS=21.2-r2
Juniper Networks Junos OS=21.2-r2-s1
Juniper Networks Junos OS=21.2-r2-s2
Juniper Networks Junos OS=21.3
Juniper Networks Junos OS=21.3-r1
Juniper Networks Junos OS=21.3-r1-s1

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS:19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases. Junos OS Evolved: 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-22240?

    CVE-2022-22240 has been assigned a CVSS score indicating a high severity due to the potential for a denial of service.

  • How do I fix CVE-2022-22240?

    To remediate CVE-2022-22240, update your Junos OS to the latest versions that contain the security patch.

  • Who is affected by CVE-2022-22240?

    CVE-2022-22240 affects certain versions of Juniper Networks Junos OS and Junos OS Evolved running on affected devices.

  • What type of vulnerability is CVE-2022-22240?

    CVE-2022-22240 is categorized as an 'Allocation of Resources Without Limits or Throttling' and 'Missing Release of Memory after Effective Lifetime' vulnerability.

  • Can CVE-2022-22240 be exploited by unauthenticated attackers?

    CVE-2022-22240 requires local authentication, meaning only authenticated low-privileged users can potentially exploit it.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203