CVE-2022-22207
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
20/07/2022
Last modified:
29/07/2022
Description
A Use After Free vulnerability in the Advanced Forwarding Toolkit (AFT) manager process (aftmand) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a kernel crash due to intensive polling of Abstracted Fabric (AF) interface statistics and thereby a Denial of Service (DoS). Continued gathering of AF interface statistics will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on MX Series: 20.1 versions later than 20.1R1; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



