CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
39.4%
The version of Junos OS installed on the remote host is affected by a vulnerability as referenced in the JSA11279 advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(156682);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/20");
script_cve_id("CVE-2022-22173");
script_xref(name:"JSA", value:"JSA11279");
script_xref(name:"IAVA", value:"2022-A-0028");
script_name(english:"Juniper Junos OS Vulnerability (JSA11279)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"The version of Junos OS installed on the remote host is affected by a vulnerability as referenced in the JSA11279
advisory.
- A Missing Release of Memory after Effective Lifetime vulnerability in the Public Key Infrastructure daemon
(pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of
Service (DoS). In a scenario where Public Key Infrastructure (PKI) is used in combination with Certificate
Revocation List (CRL), if the CRL fails to download the memory allocated to store the CRL is not released.
Repeated occurrences will eventually consume all available memory and lead to an inoperable state of the
affected system causing a DoS. This issue affects Juniper Networks Junos OS: All versions prior to
18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2
versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to
19.4R2-S5, 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions
prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2, 21.1R3; 21.2 versions
prior to 21.2R1-S1, 21.2R2. This issue can be observed by monitoring the memory utilization of the pkid
process via: root@jtac-srx1500-r2003> show system processes extensive | match pki 20931 root 20 0 733M
14352K select 0:00 0.00% pkid which increases over time: root@jtac-srx1500-r2003> show system processes
extensive | match pki 22587 root 20 0 901M 181M select 0:03 0.00% pkid (CVE-2022-22173)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-CRL-failing-to-download-causes-a-memory-leak-and-ultimately-a-DoS-CVE-2022-22173
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4ca120e1");
script_set_attribute(attribute:"solution", value:
"Apply the relevant Junos software release referenced in Juniper advisory JSA11279");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-22173");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/01/12");
script_set_attribute(attribute:"patch_publication_date", value:"2022/01/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/01/12");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:junos");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Junos Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("junos_version.nasl");
script_require_keys("Host/Juniper/JUNOS/Version");
exit(0);
}
include('junos.inc');
var ver = get_kb_item_or_exit('Host/Juniper/JUNOS/Version');
var vuln_ranges = [
{'min_ver':'0.0', 'fixed_ver':'18.3R3-S6'},
{'min_ver':'18.4', 'fixed_ver':'18.4R2-S9'},
{'min_ver':'18.4R3', 'fixed_ver':'18.4R3-S10'},
{'min_ver':'19.1', 'fixed_ver':'19.1R2-S3'},
{'min_ver':'19.1R3', 'fixed_ver':'19.1R3-S7'},
{'min_ver':'19.2', 'fixed_ver':'19.2R1-S8'},
{'min_ver':'19.2R2', 'fixed_ver':'19.2R3-S4'},
{'min_ver':'19.3', 'fixed_ver':'19.3R3-S4'},
{'min_ver':'19.4', 'fixed_ver':'19.4R2-S5'},
{'min_ver':'19.4R3', 'fixed_ver':'19.4R3-S5'},
{'min_ver':'20.1', 'fixed_ver':'20.1R3-S1'},
{'min_ver':'20.2', 'fixed_ver':'20.2R3-S2'},
{'min_ver':'20.3', 'fixed_ver':'20.3R3-S1'},
{'min_ver':'20.4', 'fixed_ver':'20.4R3'},
{'min_ver':'21.1', 'fixed_ver':'21.1R2', 'fixed_display':'21.1R2, 21.1R3'},
{'min_ver':'21.2', 'fixed_ver':'21.2R1-S1', 'fixed_display':'21.2R1-S1, 21.2R2'}
];
var fix = junos_compare_range(target_version:ver, vuln_ranges:vuln_ranges);
if (empty_or_null(fix)) audit(AUDIT_INST_VER_NOT_VULN, 'Junos OS', ver);
var report = get_report(ver:ver, fix:fix);
security_report_v4(severity:SECURITY_WARNING, port:0, extra:report);
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
39.4%