A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific transit traffic is processed the PFE will crash and restart. This issue affects Juniper Networks Junos OS: 21.4 versions prior to 21.4R1-S2, 21.4R2 on SRX Series; 22.1 versions prior to 22.1R1-S1, 22.1R2 on SRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 21.4R1.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA69886 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-10-17 20:15
Updated : 2022-10-21 10:09
NVD link : CVE-2022-22232
Mitre link : CVE-2022-22232
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
juniper
- srx210
- srx1500
- srx3600
- srx550_hm
- srx4100
- srx5000
- srx650
- srx550
- srx4600
- srx300
- srx4200
- srx340
- srx5600
- srx5800
- srx5400
- srx240
- junos
- srx380
- srx110
- srx3400
- srx320
- srx240h2
- srx1400
- srx100
- srx240m
- srx345
- srx4000
- srx550m
- srx220