Vulnerability Name:

CVE-2022-22204 (CCN-231142)

Assigned:2021-12-21
Published:2022-07-13
Updated:2022-07-27
Summary:An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by "show security alg sip calls". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
CVSS v3 Severity:5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-401
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-22204

Source: XF
Type: UNKNOWN
juniper-cve202222204-dos(231142)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA69708

Source: CCN
Type: Juniper Networks Security Bulletin JSA69708
Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic (CVE-2022-22204)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:20.4:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.4:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*
  • AND
  • cpe:/h:juniper:srx1400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx240:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx110:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx650:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx3400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx3600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx1500:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5800:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx10:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx104:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx2010:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx240:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx40:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx480:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx5:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx80:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx960:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx210:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx220:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx300:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4000:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4200:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx550:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx10000:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx10003:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx10008:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx10016:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx150:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx2008:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx2020:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:mx204:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx240h2:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx320:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx340:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx345:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx380:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5000:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx550_hm:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx550m:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:20.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:21.4:r1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 20.4 r1
    juniper junos 20.4 r1-s1
    juniper junos 21.1 r1
    juniper junos 20.4 r2
    juniper junos 21.2 r1
    juniper junos 20.4 r2-s1
    juniper junos 21.1 r1-s1
    juniper junos 21.2 r1-s1
    juniper junos 21.1 r2
    juniper junos 20.4 -
    juniper junos 20.4 r2-s2
    juniper junos 20.4 r3
    juniper junos 20.4 r3-s1
    juniper junos 21.1 -
    juniper junos 21.1 r2-s1
    juniper junos 21.1 r2-s2
    juniper junos 21.1 r3
    juniper junos 21.2 -
    juniper junos 21.2 r1-s2
    juniper junos 21.2 r2
    juniper junos 21.2 r2-s1
    juniper junos 21.3 r1
    juniper junos 21.3 r1-s1
    juniper junos 21.3 r1-s2
    juniper junos 21.4 r1
    juniper junos 21.4 r1-s1
    juniper junos 21.4 r1-s2
    juniper junos 21.1 r3-s1
    juniper srx1400 -
    juniper srx240 -
    juniper srx110 -
    juniper srx650 -
    juniper srx5600 -
    juniper srx3400 -
    juniper srx3600 -
    juniper srx1500 -
    juniper srx5800 -
    juniper mx10 -
    juniper mx104 -
    juniper mx2010 -
    juniper mx240 -
    juniper mx40 -
    juniper mx480 -
    juniper mx5 -
    juniper mx80 -
    juniper mx960 -
    juniper srx100 -
    juniper srx210 -
    juniper srx220 -
    juniper srx300 -
    juniper srx4000 -
    juniper srx4100 -
    juniper srx4200 -
    juniper srx5400 -
    juniper srx550 -
    juniper mx10000 -
    juniper mx10003 -
    juniper mx10008 -
    juniper mx10016 -
    juniper mx150 -
    juniper mx2008 -
    juniper mx2020 -
    juniper mx204 -
    juniper srx240h2 -
    juniper srx320 -
    juniper srx340 -
    juniper srx345 -
    juniper srx380 -
    juniper srx4600 -
    juniper srx5000 -
    juniper srx550 hm -
    juniper srx550m -
    juniper junos 20.4 -
    juniper junos 21.1 -
    juniper junos 21.2 -
    juniper junos 21.3 r1
    juniper junos 21.4 r1