{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-22240","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","datePublished":"2022-10-18T02:46:42.415Z","dateUpdated":"2025-05-09T15:37:34.307Z","dateReserved":"2021-12-21T00:00:00.000Z"},"containers":{"cna":{"title":"Junos OS and Junos OS Evolved: An rpd memory leak might be observed while running a specific cli command in a RIB sharding scenario","datePublic":"2022-10-12T00:00:00.000Z","providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2022-10-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with rib-sharding enabled, two issues may occur when executing a specific CLI command. One is a memory leak issue with rpd where the leak rate is not constant, and the other is a temporary spike in rpd memory usage during command execution. This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R1-S2-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1."}],"affected":[{"vendor":"Juniper Networks","product":"Junos OS","versions":[{"version":"unspecified","lessThan":"19.2R1","status":"unaffected","versionType":"custom"},{"version":"19.4","status":"affected","lessThan":"19.4R3-S9","versionType":"custom"},{"version":"20.2","status":"affected","lessThan":"20.2R3-S5","versionType":"custom"},{"version":"20.3","status":"affected","lessThan":"20.3R3-S2","versionType":"custom"},{"version":"20.4","status":"affected","lessThan":"20.4R3-S1","versionType":"custom"},{"version":"21.1","status":"affected","lessThan":"21.1R3","versionType":"custom"},{"version":"21.2","status":"affected","lessThan":"21.2R1-S2, 21.2R2-S1, 21.2R3","versionType":"custom"},{"version":"21.3","status":"affected","lessThan":"21.3R2","versionType":"custom"}]},{"vendor":"Juniper Networks","product":"Junos OS Evolved","versions":[{"version":"unspecified","lessThan":"20.4R3-S1-EVO","status":"affected","versionType":"custom"},{"version":"21.1R1-EVO","status":"affected","lessThan":"21.1-EVO*","versionType":"custom"},{"version":"21.2-EVO","status":"affected","lessThan":"21.2R1-S2-EVO, 21.2R3-EVO","versionType":"custom"},{"version":"21.3-EVO","status":"affected","lessThan":"21.3R2-EVO","versionType":"custom"}]}],"references":[{"url":"https://kb.juniper.net/JSA69896"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Denial of Service (DoS)"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-770 Allocation of Resources Without Limits or Throttling","cweId":"CWE-770"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-401 Missing Release of Memory after Effective Lifetime","cweId":"CWE-401"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"JSA69896","defect":["1615162"],"discovery":"USER"},"configurations":[{"lang":"en","value":"To be exposed to this vulnerability a device needs to be configured with BGP rib sharding as follows:\n\n  [system processes routing bgp rib-sharding]"}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted networks, hosts and users."}],"exploits":[{"lang":"en","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"solutions":[{"lang":"en","value":"The following software releases have been updated to resolve this specific issue:\nJunos OS:19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, and all subsequent releases.\nJunos OS Evolved: 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:07:49.912Z"},"title":"CVE Program Container","references":[{"url":"https://kb.juniper.net/JSA69896","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-09T15:37:27.875814Z","id":"CVE-2022-22240","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-09T15:37:34.307Z"}}]}}