Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
The following software releases have been updated to resolve this specific issue: 20.4R3, 21.1R2-S1, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.
Vendor Workaround
There are no viable workarounds for this issue, but it should be considered to disable the SIP ALG if it's not strictly needed.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-27345 | An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. On all MX and SRX platforms, if the SIP ALG is enabled, an MS-MPC or MS-MIC, or SPC will crash if it receives a SIP message with a specific contact header format. This issue affects Juniper Networks Junos OS on MX Series and SRX Series: 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions prior to 20.4R1. |
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA69513 |
|
No history.
Subscriptions
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T02:57:45.257Z
Reserved: 2021-12-21T00:00:00.000Z
Link: CVE-2022-22198
No data.
Status : Modified
Published: 2022-04-14T16:15:08.653
Modified: 2024-11-21T06:46:22.510
Link: CVE-2022-22198
No data.
OpenCVE Enrichment
No data.
EUVD