CVE-2022-22180

Summary

CVECVE-2022-22180
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-01-19 01:15:00 UTC
Updated2022-02-01 20:17:00 UTC
DescriptionAn Improper Check for Unusual or Exceptional Conditions vulnerability in the processing of specific IPv6 packets on certain EX Series devices may lead to exhaustion of DMA memory causing a Denial of Service (DoS). Over time, exploitation of this vulnerability may cause traffic to stop being forwarded, or a crash of the fxpc process. An indication of the issue occurring may be observed through the following log messages: Sep 13 17:14:59 hostname : %PFE-3: fpc0 (buf alloc) failed allocating packet buffer Sep 13 17:14:59 hostname : %PFE-7: fpc0 brcm_pkt_buf_alloc:393 (buf alloc) failed allocating packet buffer When Packet DMA heap utilization reaches 99%, the system will become unstable. Packet DMA heap utilization can be monitored using the command: user@junos# request pfe execute target fpc0 timeout 30 command "show heap" ID Base Total(b) Free(b) Used(b) % Name -- ---------- ----------- ----------- ----------- --- ----------- 0 213301a8 536870488 387228840 149641648 27 Kernel 1 91800000 8388608 3735120 4653488 55 DMA 2 92000000 75497472 74452192 1045280 1 PKT DMA DESC 3 d330000 335544320 257091400 78452920 23 Bcm_sdk 4 96800000 184549376 2408 184546968 99 Packet DMA <<<< 5 903fffe0 20971504 20971504 0 0 Blob This issue affects: Juniper Networks Junos OS 18.4 versions prior to 18.4R2-S10, 18.4R3-S10 on EX2300 Series, EX2300-MP Series, EX3400 Series; 19.1 versions prior to 19.1R3-S7 on EX2300 Series, EX2300-MP Series, EX3400 Series; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4 on EX2300 Series, EX2300-MP Series, EX3400 Series; 19.3 versions prior to 19.3R3-S5 on EX2300 Series, EX2300-MP Series, EX3400 Series; 19.4 versions prior to 19.4R3-S7 on EX2300 Series, EX2300-MP Series, EX3400 Series; 20.1 versions prior to 20.1R3-S3 on EX2300 Series, EX2300-MP Series, EX3400 Series; 20.2 versions prior to 20.2R3-S3 on EX2300 Series, EX2300-MP Series, EX3400 Series; 20.3 versions prior to 20.3R3-S2 on EX2300 Series, EX2300-MP Series, EX3400 Series; 20.4 versions prior to 20.4R3-S1 on EX2300 Series, EX2300-MP Series, EX3400 Series; 21.1 versions prior to 21.1R2-S2, 21.1R3 on EX2300 Series, EX2300-MP Series, EX3400 Series; 21.2 versions prior to 21.2R1-S2, 21.2R2 on EX2300 Series, EX2300-MP Series, EX3400 Series; 21.3 versions prior to 21.3R1-S1, 21.3R2 on EX2300 Series, EX2300-MP Series, EX3400 Series.

Risk And Classification

Problem Types: CWE-754

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Juniper Ex2300 - All All All
Hardware Juniper Ex2300-24mp - All All All
Hardware Juniper Ex2300-24p - All All All
Hardware Juniper Ex2300-24t - All All All
Hardware Juniper Ex2300-48mp - All All All
Hardware Juniper Ex2300-48p - All All All
Hardware Juniper Ex2300-48t - All All All
Hardware Juniper Ex2300-c - All All All
Hardware Juniper Ex2300m - All All All
Hardware Juniper Ex3400 - All All All
Operating System Juniper Junos 18.4 - All All
Operating System Juniper Junos 18.4 r1 All All
Operating System Juniper Junos 18.4 r1-s1 All All
Operating System Juniper Junos 18.4 r1-s2 All All
Operating System Juniper Junos 18.4 r1-s3 All All
Operating System Juniper Junos 18.4 r1-s4 All All
Operating System Juniper Junos 18.4 r1-s5 All All
Operating System Juniper Junos 18.4 r1-s6 All All
Operating System Juniper Junos 18.4 r1-s7 All All
Operating System Juniper Junos 18.4 r2 All All
Operating System Juniper Junos 18.4 r2-s1 All All
Operating System Juniper Junos 18.4 r2-s2 All All
Operating System Juniper Junos 18.4 r2-s3 All All
Operating System Juniper Junos 18.4 r2-s4 All All
Operating System Juniper Junos 18.4 r2-s5 All All
Operating System Juniper Junos 18.4 r2-s6 All All
Operating System Juniper Junos 18.4 r2-s7 All All
Operating System Juniper Junos 18.4 r2-s8 All All
Operating System Juniper Junos 18.4 r2-s9 All All
Operating System Juniper Junos 18.4 r3 All All
Operating System Juniper Junos 18.4 r3-s1 All All
Operating System Juniper Junos 18.4 r3-s2 All All
Operating System Juniper Junos 18.4 r3-s3 All All
Operating System Juniper Junos 18.4 r3-s4 All All
Operating System Juniper Junos 18.4 r3-s5 All All
Operating System Juniper Junos 18.4 r3-s6 All All
Operating System Juniper Junos 18.4 r3-s7 All All
Operating System Juniper Junos 18.4 r3-s8 All All
Operating System Juniper Junos 18.4 r3-s9 All All
Operating System Juniper Junos 19.1 - All All
Operating System Juniper Junos 19.1 r1 All All
Operating System Juniper Junos 19.1 r1-s1 All All
Operating System Juniper Junos 19.1 r1-s2 All All
Operating System Juniper Junos 19.1 r1-s3 All All
Operating System Juniper Junos 19.1 r1-s4 All All
Operating System Juniper Junos 19.1 r1-s5 All All
Operating System Juniper Junos 19.1 r1-s6 All All
Operating System Juniper Junos 19.1 r2 All All
Operating System Juniper Junos 19.1 r2-s1 All All
Operating System Juniper Junos 19.1 r2-s2 All All
Operating System Juniper Junos 19.1 r3-s7 All All
Operating System Juniper Junos 19.2 - All All
Operating System Juniper Junos 19.2 r1 All All
Operating System Juniper Junos 19.2 r1-s1 All All
Operating System Juniper Junos 19.2 r1-s2 All All
Operating System Juniper Junos 19.2 r1-s3 All All
Operating System Juniper Junos 19.2 r1-s4 All All
Operating System Juniper Junos 19.2 r1-s5 All All
Operating System Juniper Junos 19.2 r1-s6 All All
Operating System Juniper Junos 19.2 r1-s7 All All
Operating System Juniper Junos 19.2 r3-s4 All All
Operating System Juniper Junos 19.3 - All All
Operating System Juniper Junos 19.3 r1 All All
Operating System Juniper Junos 19.3 r1-s1 All All
Operating System Juniper Junos 19.3 r2 All All
Operating System Juniper Junos 19.3 r2-s1 All All
Operating System Juniper Junos 19.3 r2-s2 All All
Operating System Juniper Junos 19.3 r2-s3 All All
Operating System Juniper Junos 19.3 r2-s4 All All
Operating System Juniper Junos 19.3 r2-s5 All All
Operating System Juniper Junos 19.3 r2-s6 All All
Operating System Juniper Junos 19.3 r3-s4 All All
Operating System Juniper Junos 19.4 - All All
Operating System Juniper Junos 19.4 r1 All All
Operating System Juniper Junos 19.4 r1-s1 All All
Operating System Juniper Junos 19.4 r1-s2 All All
Operating System Juniper Junos 19.4 r1-s3 All All
Operating System Juniper Junos 19.4 r1-s4 All All
Operating System Juniper Junos 19.4 r2 All All
Operating System Juniper Junos 19.4 r2-s1 All All
Operating System Juniper Junos 19.4 r2-s2 All All
Operating System Juniper Junos 19.4 r2-s3 All All
Operating System Juniper Junos 19.4 r2-s4 All All
Operating System Juniper Junos 19.4 r2-s5 All All
Operating System Juniper Junos 19.4 r3 All All
Operating System Juniper Junos 19.4 r3-s1 All All
Operating System Juniper Junos 19.4 r3-s2 All All
Operating System Juniper Junos 19.4 r3-s3 All All
Operating System Juniper Junos 19.4 r3-s4 All All
Operating System Juniper Junos 19.4 r3-s5 All All
Operating System Juniper Junos 19.4 r3-s6 All All
Operating System Juniper Junos 20.1 - All All
Operating System Juniper Junos 20.1 r1 All All
Operating System Juniper Junos 20.1 r1-s1 All All
Operating System Juniper Junos 20.1 r1-s2 All All
Operating System Juniper Junos 20.1 r1-s3 All All
Operating System Juniper Junos 20.1 r1-s4 All All
Operating System Juniper Junos 20.1 r2 All All
Operating System Juniper Junos 20.1 r2-s1 All All
Operating System Juniper Junos 20.1 r2-s2 All All
Operating System Juniper Junos 20.1 r3 All All
Operating System Juniper Junos 20.1 r3-s1 All All
Operating System Juniper Junos 20.1 r3-s2 All All
Operating System Juniper Junos 20.2 - All All
Operating System Juniper Junos 20.2 r1 All All
Operating System Juniper Junos 20.2 r1-s1 All All
Operating System Juniper Junos 20.2 r1-s2 All All
Operating System Juniper Junos 20.2 r1-s3 All All
Operating System Juniper Junos 20.2 r2 All All
Operating System Juniper Junos 20.2 r2-s1 All All
Operating System Juniper Junos 20.2 r2-s2 All All
Operating System Juniper Junos 20.2 r2-s3 All All
Operating System Juniper Junos 20.2 r3 All All
Operating System Juniper Junos 20.2 r3-s1 All All
Operating System Juniper Junos 20.2 r3-s2 All All
Operating System Juniper Junos 20.3 - All All
Operating System Juniper Junos 20.3 r1 All All
Operating System Juniper Junos 20.3 r1-s1 All All
Operating System Juniper Junos 20.3 r2 All All
Operating System Juniper Junos 20.3 r2-s1 All All
Operating System Juniper Junos 20.3 r3 All All
Operating System Juniper Junos 20.3 r3-s1 All All
Operating System Juniper Junos 20.4 - All All
Operating System Juniper Junos 20.4 r1 All All
Operating System Juniper Junos 20.4 r1-s1 All All
Operating System Juniper Junos 20.4 r2 All All
Operating System Juniper Junos 20.4 r2-s1 All All
Operating System Juniper Junos 20.4 r2-s2 All All
Operating System Juniper Junos 20.4 r3 All All
Operating System Juniper Junos 21.1 - All All
Operating System Juniper Junos 21.1 r1 All All
Operating System Juniper Junos 21.1 r1-s1 All All
Operating System Juniper Junos 21.1 r2 All All
Operating System Juniper Junos 21.1 r2-s1 All All
Operating System Juniper Junos 21.2 - All All
Operating System Juniper Junos 21.2 r1 All All
Operating System Juniper Junos 21.2 r1-s1 All All
Operating System Juniper Junos 21.3 r1 All All

References

ReferenceSourceLinkTags
2022-01 Security Bulletin: Junos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets (CVE-2022-22180) - Juniper Networks CONFIRM kb.juniper.net
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 43924 Juniper Network Operating System (Junos OS) Denial of Service (DoS) Vulnerability (JSA11286)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report