Headline
CVE-2022-22163: 2022-01 Security Bulletin: Junos OS: jdhcpd crashes upon receipt of a specific DHCPv6 packet (CVE-2022-22163)
An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If a device is configured as DHCPv6 local server and persistent storage is enabled, jdhcpd will crash when receiving a specific DHCPv6 message. This issue affects: Juniper Networks Junos OS All versions prior to 15.1R7-S11; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2.
This issue affects all versions of Junos OS.
An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS).
If a device is configured as DHCPv6 local server and persistent storage is enabled, jdhcpd will crash when receiving a specific DHCPv6 message.
This issue affects:
Juniper Networks Junos OS
- All versions prior to 15.1R7-S11;
- 18.4 versions prior to 18.4R3-S9;
- 19.1 versions prior to 19.1R2-S3, 19.1R3-S7;
- 19.2 versions prior to 19.2R1-S8, 19.2R3-S3;
- 19.4 versions prior to 19.4R3-S5;
- 20.1 versions prior to 20.1R3-S1;
- 20.2 versions prior to 20.2R3-S2;
- 20.3 versions prior to 20.3R3-S1;
- 20.4 versions prior to 20.4R3;
- 21.1 versions prior to 21.1R2;
- 21.2 versions prior to 21.2R2.
For a device to be affected at least one of the following two lines of configuration need to be present:
[ system services dhcp-local-server dhcpv6 persistent-storage automatic ]
or
[ forwarding-options dhcp-relay dhcpv6 persistent-storage automatic ]
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
This issue was seen during production usage.
This issue has been assigned CVE-2022-22163.
The following software releases have been updated to resolve this specific issue: 15.1R7-S11, 18.4R3-S9, 19.1R2-S3, 19.1R3-S7, 19.2R1-S8, 19.2R3-S3, 19.4R3-S5, 20.1R3-S1, 20.2R3-S2, 20.3R3-S1, 20.4R3, 21.1R2, 21.1R3, 21.2R2, 21.3R1, and all subsequent releases.
This issue is being tracked as 1594371.
There are no viable workarounds for this issue.
Software releases or updates are available for download at https://support.juniper.net/support/downloads/
2022-01-12: Initial Publication.
Information for how Juniper Networks uses CVSS can be found at KB 16446 “Common Vulnerability Scoring System (CVSS) and Juniper’s Security Advisories.”