CVE-2022-22155
Summary
| CVE | CVE-2022-22155 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-01-19 01:15:00 UTC |
| Updated | 2023-07-24 13:53:00 UTC |
| Description | An Uncontrolled Resource Consumption vulnerability in the handling of IPv6 neighbor state change events in Juniper Networks Junos OS allows an adjacent attacker to cause a memory leak in the Flexible PIC Concentrator (FPC) of an ACX5448 router. The continuous flapping of an IPv6 neighbor with specific timing will cause the FPC to run out of resources, leading to a Denial of Service (DoS) condition. Once the condition occurs, further packet processing will be impacted, creating a sustained Denial of Service (DoS) condition, requiring a manual PFE restart to restore service. The following error messages will be seen after the FPC resources have been exhausted: fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 fpc0 DNX_NH::dnx_nh_tag_ipv4_hw_install(),3135: dnx_nh_tag_ipv4_hw_install: BCM L3 Egress create object failed for NH 602 (-14:No resources for operation), BCM NH Params: unit:0 Port:41, L3_INTF:0 Flags: 0x40 This issue only affects the ACX5448 router. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS on ACX5448: 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S8, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2. |
Risk And Classification
Problem Types: CWE-401
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Juniper | Acx5448 | - | All | All | All |
| Operating System | Juniper | Junos | 18.4 | - | All | All |
| Operating System | Juniper | Junos | 18.4 | r1 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s3 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s4 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s5 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s6 | All | All |
| Operating System | Juniper | Junos | 18.4 | r1-s7 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s2 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s3 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s4 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s5 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s6 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s7 | All | All |
| Operating System | Juniper | Junos | 18.4 | r2-s8 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s1 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s2 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s3 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s4 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s5 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s6 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s7 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s8 | All | All |
| Operating System | Juniper | Junos | 18.4 | r3-s9 | All | All |
| Operating System | Juniper | Junos | 19.1 | - | All | All |
| Operating System | Juniper | Junos | 19.1 | r1 | All | All |
| Operating System | Juniper | Junos | 19.1 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 19.1 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 19.1 | r1-s3 | All | All |
| Operating System | Juniper | Junos | 19.1 | r1-s4 | All | All |
| Operating System | Juniper | Junos | 19.1 | r1-s5 | All | All |
| Operating System | Juniper | Junos | 19.1 | r1-s6 | All | All |
| Operating System | Juniper | Junos | 19.1 | r2 | All | All |
| Operating System | Juniper | Junos | 19.1 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 19.1 | r2-s2 | All | All |
| Operating System | Juniper | Junos | 19.1 | r2-s3 | All | All |
| Operating System | Juniper | Junos | 19.1 | r3 | All | All |
| Operating System | Juniper | Junos | 19.1 | r3-s1 | All | All |
| Operating System | Juniper | Junos | 19.1 | r3-s2 | All | All |
| Operating System | Juniper | Junos | 19.1 | r3-s3 | All | All |
| Operating System | Juniper | Junos | 19.1 | r3-s4 | All | All |
| Operating System | Juniper | Junos | 19.2 | - | All | All |
| Operating System | Juniper | Junos | 19.2 | r1 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s3 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s4 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s5 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s6 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s7 | All | All |
| Operating System | Juniper | Junos | 19.2 | r2 | All | All |
| Operating System | Juniper | Junos | 19.2 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 19.2 | r3 | All | All |
| Operating System | Juniper | Junos | 19.2 | r3-s1 | All | All |
| Operating System | Juniper | Junos | 19.3 | - | All | All |
| Operating System | Juniper | Junos | 19.3 | r1 | All | All |
| Operating System | Juniper | Junos | 19.3 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 19.3 | r2 | All | All |
| Operating System | Juniper | Junos | 19.3 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 19.3 | r2-s2 | All | All |
| Operating System | Juniper | Junos | 19.3 | r2-s3 | All | All |
| Operating System | Juniper | Junos | 19.3 | r2-s4 | All | All |
| Operating System | Juniper | Junos | 19.3 | r2-s5 | All | All |
| Operating System | Juniper | Junos | 19.3 | r3 | All | All |
| Operating System | Juniper | Junos | 19.3 | r3-s1 | All | All |
| Operating System | Juniper | Junos | 19.4 | r1 | All | All |
| Operating System | Juniper | Junos | 19.4 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 19.4 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 19.4 | r2 | All | All |
| Operating System | Juniper | Junos | 19.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 20.1 | r1 | All | All |
| Operating System | Juniper | Junos | 20.1 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 20.1 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 20.1 | r1-s3 | All | All |
| Operating System | Juniper | Junos | 20.1 | r1-s4 | All | All |
| Operating System | Juniper | Junos | 20.2 | r1 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 2022-01 Security Bulletin: Junos OS: ACX5448: FPC memory leak due to IPv6 neighbor flaps (CVE-2022-22155) - Juniper Networks | CONFIRM | kb.juniper.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.