• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Multiple Cisco Products Vulnerabilities
January 17, 2022
Rewterz Threat Alert – APT32 Ocean Lotus – Active IOCs
January 17, 2022

Rewterz Threat Advisory – Multiple Juniper Networks Junos OS Vulnerabilities

January 17, 2022

Severity

High

Analysis Summary

CVE-2022-22160 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by an unchecked error condition vulnerability in the subscriber management daemon (smgd). By sending s specially-crafted request, a remote attacker could exploit this vulnerability to cause a crash.

CVE-2022-22159 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by a vulnerability in the NETISR network queue functionality. By sending crafted genuine packets, a remote attacker could exploit this vulnerability to cause a denial of service.

CVE-2022-22167 

Juniper Networks Junos OS could allow a remote attacker to bypass security restrictions, caused by a traffic classification vulnerability. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass Juniper Deep Packet Inspection (JDPI) rules.

CVE-2022-22156 

Juniper Networks Junos OS is vulnerable to a man-in-the-middle attack, caused by an improper certificate validation weakness. An attacker could exploit this vulnerability to compromise the integrity and confidentiality.

CVE-2022-22155 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by an uncontrolled resource consumption vulnerability in the handling of IPv6 neighbor state change events. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause a denial of service.

CVE-2022-22154 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by a junos fusion scenario an external control of critical state data vulnerability in the Satellite Device (SD) control state machine. By making physical changes to the cabling of the device, a local attacker could exploit this vulnerability to cause a denial of service.

CVE-2022-22153 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by an insufficient algorithmic complexity combined with an allocation of resources without limits or throttling vulnerability in the flow processing daemon (flowd). By sending a specially-crafted request, an attacker could exploit this vulnerability to cause latency in transit packet processing and even packet loss.

CVE-2022-22180 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by a memory leak flaw in the processing of specific IPv6 packets. By sending specially-crafted packets, a remote attacker could exploit this vulnerability to exhaust DMA memory, and results in a denial of service condition.

CVE-2022-22178 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by a stack-based buffer overflow in the flow processing daemon (flowd). By sending specially-crafted packets, a remote attacker could exploit this vulnerability to cause flowd to crash, and results in a denial of service condition.

CVE-2022-22177 

Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by a release of illegal memory flaw in the snmpd daemon. By sending specially-crafted packets, a remote attacker could exploit this vulnerability to halt the snmpd daemon, and results in a denial of service condition.

CVE-2022-22176 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper input validation by the Juniper DHCP daemon (jdhcpd). By sending a specially-crafted DHCP packet, a remote attacker could exploit this vulnerability to cause jdhcpd to crash, and results in a denial of service condition.

CVE-2022-22175 

Juniper Networks Junos OS is vulnerable to a denial of service, caused by an improper locking flaw in the SIP ALG. By sending specially-crafted packets, a remote attacker could exploit this vulnerability to cause a flowprocessing daemon (flowd) crash, and results in a denial of service condition.

Impact

  • Denial of Service
  • Security Bypass
  • Unauthorized Access

Affected Vendors

Juniper

Affected Products

  • Juniper Junos 16.1
  • Juniper Junos 19.1
  • Juniper Junos 19.2
  • Juniper Junos 19.3
  • Juniper Junos 17.3
  • Juniper Junos 17.4
  • Juniper Junos 18.1
  • Juniper Junos 18.2
  • Juniper Junos 19.4
  • Juniper Junos 16.1R1
  • Juniper Networks Junos OS 18.4
  • Juniper Networks Junos OS 19.1
  • Juniper Networks Junos OS 19.2
  • Juniper Networks Junos OS 19.3
  • Juniper Networks MX Series
  • Juniper Networks SRX Series
  • Juniper Networks Junos OS 20.4
  • Juniper Networks Junos OS 21.1
  • Juniper Networks Junos OS 15.1
  • Juniper Networks Junos OS 18.3

Remediation

Refer to Juniper Networks Security Bulletin for patch, upgrade or suggested workaround information.

CVE-2022-22160 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11268&cat=SIRT_1&actp=LIST
CVE-2022-22159 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11268&cat=SIRT_1&actp=LIST
CVE-2022-22167 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11265&cat=SIRT_1&actp=LIST
CVE-2022-22156 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11265&cat=SIRT_1&actp=LIST
CVE-2022-22155 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11263&cat=SIRT_1&actp=LIST
CVE-2022-22154 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11262&cat=SIRT_1&actp=LIST
CVE-2022-22153 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11261&cat=SIRT_1&actp=LIST
CVE-2022-22180 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11286&cat=SIRT_1&actp=LIST
CVE-2022-22178 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11285&cat=SIRT_1&actp=LIST
CVE-2022-22177 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11283&cat=SIRT_1&actp=LIST
CVE-2022-22176 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11282&cat=SIRT_1&actp=LIST
CVE-2022-22175

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11281&cat=SIRT_1&actp=LIST
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.