CVE-2022-22228 An attacker can cause an RPD memory leak, which leads to a DoS.
The attacker can generate malformed and/or fragmented IPv6 packets to the RPD. If the RPD attempts to parse and process these malformed and/or fragmented IPv6 packets, it will invalidate RPD state and lead to a Denial of Service. This issue has been assigned the CVE ID CVE-2018-5713. This vulnerability can be exploited remotely. It can be exploited via the following vectors: By defaulting to the IPv4 protocol on an IPv6-enabled network.
By connecting to the Junos OS device via SSH, Telnet, or other remote management protocols.
By connecting to the Junos OS device via HTTP or other remote management protocols. Juniper Networks recommends that administrators apply the appropriate updates as soon as possible. In addition, if possible, administrators are encouraged to only enable the IPv6 protocol on the device if it is required to be used for management or other essential functions.
Vulnerability Details
An attacker can send malformed and/or fragmented IPv6 packets to the RPD. If the RPD attempts to parse and process these malformed and/or fragmented IPv6 packets, it will invalidate RPD state and lead to a Denial of Service. This issue has been assigned the CVE ID CVE-2018-5713.
By defaulting to the IPv4 protocol on an IPv6-enabled network.
By connecting to the Junos OS device via SSH, Telnet, or other remote management protocols.
By connecting to the Junos OS device via HTTP or other remote management protocols. Juniper Networks recommends that administrators apply the appropriate updates as soon as possible. In addition, if possible, administrators are encouraged to only enable the IPv6 protocol on the device if it is required to be used for management or other essential functions.
Vulnerability overview
This vulnerability is caused by a malformed IPv6 packet. If a device sees this malformed packet, it will invalidate its state and lead to Denial of Service. If the device can't use IPv6, there's no impact. This issue has been assigned CVE ID CVE-2018-5713.
This vulnerability can be exploited remotely by defaulting to the IPv4 protocol on an IPv6-enabled network or by connecting to the Junos OS device via SSH, Telnet, or other remote management protocols or by connecting to the Junos OS device via HTTP or other remote management protocols.
Timeline
Published on: 10/18/2022 03:15:00 UTC