目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2022-22250— Juniper Networks Junos OS 安全漏洞

CVSS 6.5 · Medium EPSS 0.08% · P24
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2022-22250の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS and Junos OS Evolved: An FPC crash might be seen due to an EVPN MAC entry moving from local to remote
ソース: NVD (National Vulnerability Database)
脆弱性説明
An Improper Control of a Resource Through its Lifetime vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows unauthenticated adjacent attacker to cause a Denial of Service (DoS). In an EVPN-MPLS scenario, if MAC is learned locally on an access interface but later a request to delete is received indicating that the MAC was learnt remotely, this can lead to memory corruption which can result in line card crash and reload. This issue affects: Juniper Networks Junos OS All versions 17.3R1 and later versions prior to 19.2R3-S5; 19.3 versions prior to 19.3R3-S5; 19.4 versions prior to 19.4R2-S6, 19.4R3-S8; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R1-S1, 21.4R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S3-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 17.3R1.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS 存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 17.3R1 ~ unspecified -
Juniper NetworksJunos OS Evolved unspecified ~ 20.4R3-S3-EVO -

II. CVE-2022-22250の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2022-22250のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2022-10-18 · 36 CVEs total

CVE-2022-222298.4 HIGHParagon Active Assurance (Formerly Netrounds): Stored Cross-site Scripting (XSS) vulnerabi
CVE-2022-222398.2 HIGHJunos OS Evolved: The ssh CLI command always runs as root which can lead to privilege esca
CVE-2022-222418.1 HIGHJunos OS: Vulnerability in J-Web may allow deserialization without authentication
CVE-2022-222517.8 HIGHcSRX Series: Storing Passwords in a Recoverable Format and software permissions issues all
CVE-2022-222317.5 HIGHSRX Series: If UTM Enhanced Content Filtering and AntiVirus are enabled, and specific traf
CVE-2022-222327.5 HIGHSRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled
CVE-2022-222287.5 HIGHJunos OS: IPv6 OAM SRv6 network-enabled devices are vulnerable to Denial of Service (DoS)
CVE-2022-222367.5 HIGHJunos OS: SRX Series and MX Series: When specific valid SIP packets are received the PFE w
CVE-2022-222187.5 HIGHJunos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash duri
CVE-2022-222117.5 HIGHJunos OS Evolved: PTX Series: Multiple FPCs become unreachable due to continuous polling o
CVE-2022-222017.5 HIGHSRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, th
CVE-2022-221927.5 HIGHJunos OS Evolved: PTX Series: An attacker can cause a kernel panic by sending a malformed
CVE-2022-222467.5 HIGHJunos OS: PHP file inclusion vulnerability in J-Web
CVE-2022-222477.5 HIGHJunos OS Evolved: Kernel processing of unvalidated TCP segments could lead to a Denial of
CVE-2022-222487.3 HIGHJunos OS Evolved: Incorrect file permissions can allow low-privileged user to cause anothe
CVE-2022-222236.5 MEDIUMJunos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted p
CVE-2022-222246.5 MEDIUMJunos OS and Junos OS Evolved: PPMD goes into infinite loop upon receipt of malformed OSPF
CVE-2022-222266.5 MEDIUMJunos OS: EX4300-MP, EX4600, QFX5000 Series: In VxLAN scenarios specific packets processed
CVE-2022-222306.5 MEDIUMJunos OS and Junos OS Evolved: RPD crash upon receipt of specific OSPFv3 LSAs
CVE-2022-222496.5 MEDIUMJunos OS: MX Series: An FPC crash might be seen due to mac-moves within the same bridge do

Showing 20 of 36 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2022-22250へのコメント

まだコメントはありません


コメントを残す