An Improper Input Validation vulnerability in ingress TCP segment processing of Juniper Networks Junos OS Evolved allows a network-based unauthenticated attacker to send a crafted TCP segment to the device, triggering a kernel panic, leading to a Denial of Service (DoS) condition. Continued receipt and processing of this TCP segment could create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS Evolved: 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R2-EVO; 22.1 versions prior to 22.1R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.3R1-EVO.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://kb.juniper.net/JSA69904 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T17:59:17.535Z
Reserved: 2021-12-21T00:00:00
Link: CVE-2022-22247

No data.

Status : Modified
Published: 2022-10-18T03:15:11.387
Modified: 2024-11-21T06:46:29.017
Link: CVE-2022-22247

No data.