CVE-2022-22218
18.10.2022, 03:15
On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Authority (CA) server, leading to crash. A restart is required to restore services. This issue affects: Juniper Networks Junos OS on SRX Series: All versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 𝑥 < 19.1 |
juniper | junos | 19.1 |
juniper | junos | 19.1:r1 |
juniper | junos | 19.1:r1-s1 |
juniper | junos | 19.1:r1-s2 |
juniper | junos | 19.1:r1-s3 |
juniper | junos | 19.1:r1-s4 |
juniper | junos | 19.1:r1-s5 |
juniper | junos | 19.1:r1-s6 |
juniper | junos | 19.1:r2 |
juniper | junos | 19.1:r2-s1 |
juniper | junos | 19.1:r2-s2 |
juniper | junos | 19.1:r2-s3 |
juniper | junos | 19.1:r3 |
juniper | junos | 19.1:r3-s1 |
juniper | junos | 19.1:r3-s2 |
juniper | junos | 19.1:r3-s3 |
juniper | junos | 19.1:r3-s4 |
juniper | junos | 19.1:r3-s5 |
juniper | junos | 19.1:r3-s6 |
juniper | junos | 19.1:r3-s7 |
juniper | junos | 19.1:r3-s8 |
juniper | junos | 19.2 |
juniper | junos | 19.2:r1 |
juniper | junos | 19.2:r1-s1 |
juniper | junos | 19.2:r1-s2 |
juniper | junos | 19.2:r1-s3 |
juniper | junos | 19.2:r1-s4 |
juniper | junos | 19.2:r1-s5 |
juniper | junos | 19.2:r1-s6 |
juniper | junos | 19.2:r1-s7 |
juniper | junos | 19.2:r1-s8 |
juniper | junos | 19.2:r1-s9 |
juniper | junos | 19.2:r2 |
juniper | junos | 19.2:r2-s1 |
juniper | junos | 19.2:r3 |
juniper | junos | 19.2:r3-s1 |
juniper | junos | 19.2:r3-s2 |
juniper | junos | 19.2:r3-s3 |
juniper | junos | 19.2:r3-s4 |
juniper | junos | 19.2:r3-s5 |
juniper | junos | 19.3 |
juniper | junos | 19.3:r1 |
juniper | junos | 19.3:r1-s1 |
juniper | junos | 19.3:r2 |
juniper | junos | 19.3:r2-s1 |
juniper | junos | 19.3:r2-s2 |
juniper | junos | 19.3:r2-s3 |
juniper | junos | 19.3:r2-s4 |
juniper | junos | 19.3:r2-s5 |
juniper | junos | 19.3:r2-s6 |
juniper | junos | 19.3:r3 |
juniper | junos | 19.3:r3-s1 |
juniper | junos | 19.3:r3-s2 |
juniper | junos | 19.3:r3-s3 |
juniper | junos | 19.3:r3-s4 |
juniper | junos | 19.3:r3-s5 |
juniper | junos | 19.3:r3-s6 |
juniper | junos | 19.4 |
juniper | junos | 19.4:r1 |
juniper | junos | 19.4:r1-s1 |
juniper | junos | 19.4:r1-s2 |
juniper | junos | 19.4:r1-s3 |
juniper | junos | 19.4:r1-s4 |
juniper | junos | 19.4:r2 |
juniper | junos | 19.4:r2-s1 |
juniper | junos | 19.4:r2-s2 |
juniper | junos | 19.4:r2-s3 |
juniper | junos | 19.4:r2-s4 |
juniper | junos | 19.4:r2-s5 |
juniper | junos | 19.4:r2-s6 |
juniper | junos | 19.4:r3 |
juniper | junos | 19.4:r3-s1 |
juniper | junos | 19.4:r3-s2 |
juniper | junos | 19.4:r3-s3 |
juniper | junos | 19.4:r3-s4 |
juniper | junos | 19.4:r3-s5 |
juniper | junos | 19.4:r3-s6 |
juniper | junos | 19.4:r3-s7 |
juniper | junos | 19.4:r3-s8 |
juniper | junos | 20.2 |
juniper | junos | 20.2:r1 |
juniper | junos | 20.2:r1-s1 |
juniper | junos | 20.2:r1-s2 |
juniper | junos | 20.2:r1-s3 |
juniper | junos | 20.2:r2 |
juniper | junos | 20.2:r2-s1 |
juniper | junos | 20.2:r2-s2 |
juniper | junos | 20.2:r2-s3 |
juniper | junos | 20.2:r3 |
juniper | junos | 20.2:r3-s1 |
juniper | junos | 20.2:r3-s2 |
juniper | junos | 20.2:r3-s3 |
juniper | junos | 20.2:r3-s4 |
juniper | junos | 20.3 |
juniper | junos | 20.3:r1 |
juniper | junos | 20.3:r1-s1 |
juniper | junos | 20.3:r1-s2 |
juniper | junos | 20.3:r2 |
juniper | junos | 20.3:r2-s1 |
juniper | junos | 20.3:r3 |
juniper | junos | 20.3:r3-s1 |
juniper | junos | 20.3:r3-s2 |
juniper | junos | 20.3:r3-s3 |
juniper | junos | 20.4 |
juniper | junos | 20.4:r1 |
juniper | junos | 20.4:r1-s1 |
juniper | junos | 20.4:r2 |
juniper | junos | 20.4:r2-s1 |
juniper | junos | 20.4:r2-s2 |
juniper | junos | 20.4:r3 |
juniper | junos | 20.4:r3-s1 |
juniper | junos | 20.4:r3-s2 |
juniper | junos | 20.4:r3-s3 |
juniper | junos | 21.1 |
juniper | junos | 21.1:r1 |
juniper | junos | 21.1:r1-s1 |
juniper | junos | 21.1:r2 |
juniper | junos | 21.1:r2-s1 |
juniper | junos | 21.1:r2-s2 |
juniper | junos | 21.1:r3 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r2-s1 |
juniper | junos | 21.2:r2-s2 |
juniper | junos | 21.3 |
juniper | junos | 21.3:r1 |
juniper | junos | 21.3:r1-s1 |
juniper | junos | 21.3:r1-s2 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration