Juniper Alert
3360Warning Date
Severity Level
Warning Number
Target Sector
17 April, 2022
● High
2022-4680
All
Juniper has released security updates to address multiple vulnerabilities in the following products:
- All versions prior to 20.4R3-S1-EVO;
- 21.1 versions prior to 21.1R3-EVO;
- 21.2 versions prior to 21.2R3-EVO;
- 21.3 versions prior to 21.3R2-EVO.
- Juniper Networks
- Junos OS19.3 versions prior to 19.3R3-S4;
- 19.4 versions prior to 19.4R2-S6, 19.4R3-S6;
- 20.1 versions prior to 20.1R3-S2;
- 20.2 versions prior to 20.2R3-S3;
- 20.3 versions prior to 20.3R3-S1;
- 20.4 versions prior to 20.4R3;
- 21.1 versions prior to 21.1R3;
- 21.2 versions prior to 21.2R2.
- All versions prior to 17.3R3-S11;
- 17.4 versions prior to 17.4R2-S13, 17.4R3-S4;
- 18.3 versions prior to 18.3R3-S4;
- 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S6;
- 19.1 versions prior to 19.1R3-S4;
- 19.2 versions prior to 19.2R1-S6, 19.2R3-S2;
- 19.3 versions prior to 19.3R2-S6, 19.3R3-S1;
- 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3;
- 20.1 versions prior to 20.1R2;
- 20.2 versions prior to 20.2R2;
- 20.3 versions prior to 20.3R1-S2, 20.3R2.
- 12.3 versions prior to 12.3R12-S19;
- 15.1 versions prior to 15.1R7-S10;
- 18.3 versions prior to 18.3R3-S5;
- 18.4 versions prior to 18.4R2-S10, 18.4R3-S9;
- 19.1 versions prior to 19.1R2-S3, 19.1R3-S6;
- 19.2 versions prior to 19.2R1-S8, 19.2R3-S3;
- 19.3 versions prior to 19.3R2-S6, 19.3R3-S3;
- Juniper Networks Junos OS Evolved
- All versions prior to 20.4R3-S3-EVO;
- 21.2 versions prior to 21.2R2-EVO.
- All versions prior to 20.1R3;
- 20.2 versions prior to 20.2R3;
- 20.3 versions prior to 20.3R2.
- 20.4 versions prior to 20.4R3-S2-EVO;
- 21.1 versions prior to 21.1R3-S1-EVO;
- 21.2 versions prior to 21.2R3-EVO;
- 21.3 versions prior to 21.3R2-EVO;
- 21.4 versions prior to 21.4R2-EVO.
- Juniper Networks Paragon Active Assurance Formerly Netrounds (Active Assurance)
- 3.1 version 3.1.0 and later versions;
- 3.2 version 3.2.0 and later versions;
- 3.3 version 3.3.0 and later versions.
Attacker could exploit these vulnerabilities by doing the following:
- Denial of service attack (DoS)
- Cross-site scripting (XSS)
The CERT team encourages users to review Juniper security advisory and apply the necessary updates:
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-EX4650-Series-Certain-traffic-received-by-the-Junos-OS-device-on-the-management-interface-may-be-forwarded-to-egress-interfaces-instead-of-discarded-CVE-2022-22186?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Contrail-Service-Orchestration-An-authenticated-local-user-may-have-their-permissions-elevated-via-the-device-via-management-interface-without-authentication-CVE-2022-22189?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Paragon-Active-Assurance-Local-Privilege-Escalation-in-polkits-pkexec-CVE-2021-4034?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-Evolved-PTX-series-An-attacker-sending-a-crafted-GRE-packet-will-cause-the-PFE-to-restart-CVE-2022-22194?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-JIMS-Local-Privilege-Escalation-vulnerability-via-repair-functionality-CVE-2022-22187?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-SRX-Series-Denial-of-service-vulnerability-in-flowd-daemon-upon-receipt-of-a-specific-fragmented-packet-CVE-2022-22185?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-vSRX-3-0-model-FreeBSD-SA-20-26-dhclient-heap-overflow-CVE-2020-7461?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-MS-MPC-or-MS-MIC-or-SPC-crashes-if-it-receives-a-SIP-message-with-a-specific-contact-header-format-CVE-2022-22198?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-EX4300-PFE-Denial-of-Service-DoS-upon-receipt-of-a-flood-of-specific-ARP-traffic-CVE-2022-22191?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-QFX5100-QFX5110-QFX5120-QFX5200-QFX5210-EX4600-EX4650-Series-When-storm-control-profiling-is-enabled-and-a-device-is-under-an-active-storm-a-Heap-based-Buffer-Overflow-in-the-PFE-will-cause-a-device-hang-CVE-2022-22188?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Contrail-Networking-Multiple-vulnerabilities-resolved-in-Contrail-Networking-21-3-CVE-yyyy-nnnn?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-EX4300-PFE-Denial-of-Service-DoS-upon-receipt-of-a-flood-of-specific-ARP-traffic-CVE-2022-22191?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-vSRX-3-0-model-FreeBSD-SA-20-26-dhclient-heap-overflow-CVE-2020-7461?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-SRX-Series-Denial-of-service-vulnerability-in-flowd-daemon-upon-receipt-of-a-specific-fragmented-packet-CVE-2022-22185?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-A-XSS-vulnerability-allows-an-attacker-to-execute-commands-on-a-target-J-Web-session-CVE-2022-22182?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-rib-sharding-scenario-when-a-certain-CLI-command-is-executed-the-rpd-process-might-crash-CVE-2022-22193?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-Evolved-A-remote-attacker-may-cause-a-CPU-Denial-of-Service-by-sending-genuine-traffic-to-a-device-on-a-specific-IPv4-port-CVE-2022-22183?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-J-Web-can-be-compromised-through-reflected-XSS-attacks-CVE-2022-22181?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-core-will-be-observed-with-proxy-BGP-route-target-filtering-enabled-and-certain-route-add-and-delete-event-happening-CVE-2022-22197?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-CPU-spikes-to-100-after-a-malformed-ISIS-TLV-has-been-received-CVE-2022-22196?language=en_US
- https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-Evolved-Specific-packets-reaching-the-RE-lead-to-a-counter-overflow-and-eventually-a-crash-CVE-2022-22195?language=en_US