Vulnerability Details CVE-2022-22207
A Use After Free vulnerability in the Advanced Forwarding Toolkit (AFT) manager process (aftmand) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a kernel crash due to intensive polling of Abstracted Fabric (AF) interface statistics and thereby a Denial of Service (DoS). Continued gathering of AF interface statistics will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on MX Series: 20.1 versions later than 20.1R1; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 46.0%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2022-22207
-
cpe:2.3:h:juniper:mx10000:-
-
cpe:2.3:h:juniper:mx10003:-
-
cpe:2.3:h:juniper:mx10008:-
-
cpe:2.3:h:juniper:mx10016:-
-
cpe:2.3:h:juniper:mx104:-
-
-
cpe:2.3:h:juniper:mx150:-
-
cpe:2.3:h:juniper:mx2008:-
-
cpe:2.3:h:juniper:mx2010:-
-
cpe:2.3:h:juniper:mx2020:-
-
cpe:2.3:h:juniper:mx204:-
-
cpe:2.3:h:juniper:mx240:-
-
-
cpe:2.3:h:juniper:mx480:-
-
-
-
cpe:2.3:h:juniper:mx960:-
-
cpe:2.3:o:juniper:junos:20.1
-
cpe:2.3:o:juniper:junos:20.2
-
cpe:2.3:o:juniper:junos:20.3
-
cpe:2.3:o:juniper:junos:20.4
-
cpe:2.3:o:juniper:junos:21.1
-
cpe:2.3:o:juniper:junos:21.2