{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-22230","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","datePublished":"2022-10-18T02:46:32.057Z","dateUpdated":"2025-05-12T14:29:00.641Z","dateReserved":"2021-12-21T00:00:00.000Z"},"containers":{"cna":{"title":"Junos OS and Junos OS Evolved: RPD crash upon receipt of specific OSPFv3 LSAs","datePublic":"2022-10-12T00:00:00.000Z","providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2022-10-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause DoS (Denial of Service). If another router generates more than one specific valid OSPFv3 LSA then rpd will crash while processing these LSAs. This issue only affects systems configured with OSPFv3, while OSPFv2 is not affected. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S6; 19.3 version 19.3R2 and later versions; 19.4 versions prior to 19.4R2-S8, 19.4R3-S9; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S1-EVO; 21.3-EVO versions prior to 21.3R3-S2-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS 19.2 versions prior to 19.2R2."}],"affected":[{"vendor":"Juniper Networks","product":"Junos OS","versions":[{"version":"19.2","status":"affected","lessThan":"19.2R3-S6","versionType":"custom","changes":[{"at":"19.2R2","status":"affected"}]},{"version":"19.3R2","status":"affected","lessThan":"19.3*","versionType":"custom"},{"version":"19.4","status":"affected","lessThan":"19.4R2-S8, 19.4R3-S9","versionType":"custom"},{"version":"20.1R1","status":"affected","lessThan":"20.1*","versionType":"custom"},{"version":"20.2","status":"affected","lessThan":"20.2R3-S5","versionType":"custom"},{"version":"20.3","status":"affected","lessThan":"20.3R3-S5","versionType":"custom"},{"version":"20.4","status":"affected","lessThan":"20.4R3-S4","versionType":"custom"},{"version":"21.1","status":"affected","lessThan":"21.1R3-S2","versionType":"custom"},{"version":"21.2","status":"affected","lessThan":"21.2R3-S1","versionType":"custom"},{"version":"21.3","status":"affected","lessThan":"21.3R3-S2","versionType":"custom"},{"version":"21.4","status":"affected","lessThan":"21.4R2","versionType":"custom"}]},{"vendor":"Juniper Networks","product":"Junos OS Evolved","versions":[{"version":"unspecified","lessThan":"20.4R3-S5-EVO","status":"affected","versionType":"custom"},{"version":"21.1-EVO","status":"affected","lessThan":"21.1R3-S2-EVO","versionType":"custom"},{"version":"21.2-EVO","status":"affected","lessThan":"21.2R3-S1-EVO","versionType":"custom"},{"version":"21.3-EVO","status":"affected","lessThan":"21.3R3-S2-EVO","versionType":"custom"},{"version":"21.4-EVO","status":"affected","lessThan":"21.4R2-EVO","versionType":"custom"},{"version":"22.1-EVO","status":"affected","lessThan":"22.1R2-EVO","versionType":"custom"},{"version":"22.2-EVO","status":"affected","lessThan":"22.2R2-EVO","versionType":"custom"}]}],"references":[{"url":"https://kb.juniper.net/JSA69884"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]},{"descriptions":[{"type":"text","lang":"en","description":"Denial of Service"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"JSA69884","defect":["1645221"],"discovery":"USER"},"configurations":[{"lang":"en","value":"For a system to be affected the following minimal OSPFv3 configuration needs to be present:\n\n  [protocols ospf3 area <area-ID> interface <interface>]"}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue."}],"exploits":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"solutions":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue: \nJunos OS: 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1 and all subsequent releases.\nJunos OS Evolved: 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO and all subsequent releases."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:07:50.177Z"},"title":"CVE Program Container","references":[{"url":"https://kb.juniper.net/JSA69884","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-12T14:28:54.569138Z","id":"CVE-2022-22230","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-12T14:29:00.641Z"}}]}}