CVE-2022-22227 (GCVE-0-2022-22227)
Vulnerability from cvelistv5
Published
2022-10-18 02:46
Modified
2025-05-12 14:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
- Denial of Service (DoS)
Summary
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS Evolved |
Patch: unspecified < 21.1R1-EVO Version: 21.1-EVO < 21.1R3-S2-EVO Version: 21.2-EVO < 21.2R3-S2-EVO Version: 21.3-EVO < 21.3R3-EVO Version: 21.4-EVO < 21.4R1-S1-EVO, 21.4R2-EVO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kb.juniper.net/JSA69878" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-22227", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-12T14:29:48.739364Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-12T14:29:55.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "ACX7100-48L, ACX7100-32C, ACX7509" ], "product": "Junos OS Evolved", "vendor": "Juniper Networks", "versions": [ { "lessThan": "21.1R1-EVO", "status": "unaffected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "21.1R3-S2-EVO", "status": "affected", "version": "21.1-EVO", "versionType": "custom" }, { "lessThan": "21.2R3-S2-EVO", "status": "affected", "version": "21.2-EVO", "versionType": "custom" }, { "lessThan": "21.3R3-EVO", "status": "affected", "version": "21.3-EVO", "versionType": "custom" }, { "lessThan": "21.4R1-S1-EVO, 21.4R2-EVO", "status": "affected", "version": "21.4-EVO", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "To be exposed to this vulnerability a device needs to be configured with a minimal IPv6 configuration like in the following example:\n\n [ interfaces \u003cinterface\u003e unit \u003cunit number\u003e family inet6 ]" } ], "datePublic": "2022-10-12T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "description": "Denial of Service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-18T00:00:00.000Z", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "url": "https://kb.juniper.net/JSA69878" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, and all subsequent releases." } ], "source": { "advisory": "JSA69878", "defect": [ "1641006" ], "discovery": "USER" }, "title": "Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2022-22227", "datePublished": "2022-10-18T02:46:28.960Z", "dateReserved": "2021-12-21T00:00:00.000Z", "dateUpdated": "2025-05-12T14:29:55.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22227\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2022-10-18T03:15:09.997\",\"lastModified\":\"2024-11-21T06:46:26.273\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de comprobaci\u00f3n inapropiada de condiciones inusuales o excepcionales en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS Evolved on ACX7000 Series permite a un atacante no autenticado basado en la red causar una Denegaci\u00f3n de Servicio (DoS) parcial. Al recibir un tr\u00e1fico de tr\u00e1nsito IPv6 espec\u00edfico, Junos OS Evolved en ACX7100-48L, ACX7100-32C y ACX7509 env\u00eda este tr\u00e1fico al motor de enrutamiento (RE) en lugar de reenviarlo, conllevando a un aumento del uso de la CPU del RE y una denegaci\u00f3n de servicio parcial. Este problema s\u00f3lo afecta a sistemas configurados con IPv6. Este problema no afecta al ACX7024, que es admitido a partir de la versi\u00f3n 22.3R1-EVO, en la que ya ha sido incorporado la correcci\u00f3n como es indicado en la secci\u00f3n de soluciones. Este problema afecta a Juniper Networks Junos OS Evolved en ACX7100-48L, ACX7100-32C, ACX7509: versiones 21.1-EVO anteriores a 21.1R3-S2-EVO; versiones 21.2-EVO anteriores a 21.2R3-S2-EVO; versiones 21.3-EVO anteriores a 21.3R3-EVO; versiones 21.4-EVO anteriores a 21.4R1-S1-EVO, 21.4R2-EVO. Este problema no afecta a Juniper Networks Junos OS Evolved versiones anteriores a 21.1R1-EVO\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C3552E-798F-4719-B38D-F74E34EAAA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE674DD3-3590-4434-B144-5AD7EB5F039D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0099BDA9-9D4B-4D6C-8234-EFD9E8C63476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8729BC1-FB09-4E6D-A5D5-8BDC589555B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D72C3DF-4513-48AC-AAED-C1AADF0794E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C583289-96C4-4451-A320-14CA1C390819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"620B0CDD-5566-472E-B96A-31D2C12E3120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E57AF-979B-4022-8AD6-B3558E06B718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"144730FB-7622-4B3D-9C47-D1B7A7FB7EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA246F0-154E-4F44-A97B-690D22FA73DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D6C07C-F96E-4523-BB54-7FEABFE1D1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B70C784-534B-4FAA-A5ED-3709656E2B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"60448FFB-568E-4280-9261-ADD65244F31A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B770C52-7E3E-4B92-9138-85DEC56F3B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC38173-44AB-43D5-8C27-CB43AD5E0B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4DD04A-DE52-46BE-8C34-8DB47F7500F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE0E145-8E1C-446E-90ED-237E3B9CAF47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F26369D-21B2-4C6A-98C1-492692A61283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"24003819-1A6B-4BDF-B3DF-34751C137788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8D332E-9133-45B9-BB07-B33C790F737A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E907193-075E-45BC-9257-9607DB790D71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:acx7100-32c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FF19E76-F26B-4111-A814-BA7E5C3F2A74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:acx7100-48l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F48C7E15-C23D-4E2D-9A1B-C314383C8C32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:acx7509:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B50EC358-F551-4F2B-9DA1-61B6412AB957\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA69878\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA69878\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://kb.juniper.net/JSA69878\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T03:07:50.130Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-22227\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-12T14:29:48.739364Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-12T14:29:52.067Z\"}}], \"cna\": {\"title\": \"Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization\", \"source\": {\"defect\": [\"1641006\"], \"advisory\": \"JSA69878\", \"discovery\": \"USER\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS Evolved\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"unspecified\", \"lessThan\": \"21.1R1-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.1-EVO\", \"lessThan\": \"21.1R3-S2-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.2-EVO\", \"lessThan\": \"21.2R3-S2-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.3-EVO\", \"lessThan\": \"21.3R3-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.4-EVO\", \"lessThan\": \"21.4R1-S1-EVO, 21.4R2-EVO\", \"versionType\": \"custom\"}], \"platforms\": [\"ACX7100-48L, ACX7100-32C, ACX7509\"]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The following software releases have been updated to resolve this specific issue: 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, and all subsequent releases.\"}], \"datePublic\": \"2022-10-12T00:00:00.000Z\", \"references\": [{\"url\": \"https://kb.juniper.net/JSA69878\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"There are no viable workarounds for this issue.\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and ACX7509 sends this traffic to the Routing Engine (RE) instead of forwarding it, leading to increased CPU utilization of the RE and a partial DoS. This issue only affects systems configured with IPv6. This issue does not affect ACX7024 which is supported from 22.3R1-EVO onwards where the fix has already been incorporated as indicated in the solution section. This issue affects Juniper Networks Junos OS Evolved on ACX7100-48L, ACX7100-32C, ACX7509: 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S2-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754 Improper Check for Unusual or Exceptional Conditions\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Denial of Service (DoS)\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"To be exposed to this vulnerability a device needs to be configured with a minimal IPv6 configuration like in the following example:\\n\\n [ interfaces \u003cinterface\u003e unit \u003cunit number\u003e family inet6 ]\"}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2022-10-18T00:00:00.000Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-22227\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-12T14:29:55.117Z\", \"dateReserved\": \"2021-12-21T00:00:00.000Z\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"datePublished\": \"2022-10-18T02:46:28.960Z\", \"assignerShortName\": \"juniper\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…