{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-22232","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","datePublished":"2022-10-18T02:46:34.119Z","dateUpdated":"2025-05-09T18:10:44.844Z","dateReserved":"2021-12-21T00:00:00.000Z"},"containers":{"cna":{"title":"SRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific traffic is processed the PFE will crash","datePublic":"2022-10-12T00:00:00.000Z","providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2022-10-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific transit traffic is processed the PFE will crash and restart. This issue affects Juniper Networks Junos OS: 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series; 22.1 versions prior to 22.1R1-S1, 22.1R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1."}],"affected":[{"vendor":"Juniper Networks","product":"Junos OS","versions":[{"version":"unspecified","lessThan":"21.4R1","status":"unaffected","versionType":"custom"},{"version":"21.4","status":"affected","lessThan":"21.4R1-S2, 21.4R2","versionType":"custom"},{"version":"22.1","status":"affected","lessThan":"22.1R1-S1, 22.1R2","versionType":"custom"}],"platforms":["SRX Series"]}],"references":[{"url":"https://kb.juniper.net/JSA69886"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-476 NULL Pointer Dereference","cweId":"CWE-476"}]},{"descriptions":[{"type":"text","lang":"en","description":"Denial of Service (DoS)"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"JSA69886","defect":["1657887"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"For a device to be affected the following configuration has to be present:\n\n  [security utm utm-policy <policy-name> content-filtering rule-set <rule-set-name>]"}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue."}],"exploits":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"solutions":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue: Junos OS: 21.4R1-S2, 21.4R2, 22.1R1-S1 22.1R2, 22.2R1, and all subsequent releases."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:07:49.938Z"},"title":"CVE Program Container","references":[{"url":"https://kb.juniper.net/JSA69886","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-09T18:10:38.684096Z","id":"CVE-2022-22232","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-09T18:10:44.844Z"}}]}}