A Use After Free vulnerability in the Advanced Forwarding Toolkit (AFT) manager process (aftmand) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a kernel crash due to intensive polling of Abstracted Fabric (AF) interface statistics and thereby a Denial of Service (DoS). Continued gathering of AF interface statistics will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on MX Series: 20.1 versions later than 20.1R1; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA69711 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-07-20 08:15
Updated : 2022-07-29 06:43
NVD link : CVE-2022-22207
Mitre link : CVE-2022-22207
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
juniper
- mx10
- mx480
- mx5
- mx80
- mx10000
- junos
- mx10016
- mx960
- mx2008
- mx204
- mx104
- mx10003
- mx2010
- mx150
- mx240
- mx2020
- mx10008
- mx40