Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.JUNIPER_JSA69717.NASL
HistoryAug 23, 2022 - 12:00 a.m.

Juniper Junos OS Vulnerability (JSA69717)

2022-08-2300:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
22
juniper networks
denial of service
bgp update

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.4%

The version of Junos OS installed on the remote host is affected by a vulnerability as referenced in the JSA69717 advisory.

  • A vulnerability in Handling of Undefined Values in the routing protocol daemon (RPD) process of Juniper Networks Junos OS and Junos OS Evolved may allow an unauthenticated network-based attacker to crash the RPD process by sending a specific BGP update while the system is under heavy load, leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Malicious exploitation of this issue requires a very specific combination of load, timing, and configuration of the vulnerable system which is beyond the direct control of the attacker.
    Internal reproduction has only been possible through artificially created load and specially instrumented source code. Systems are only vulnerable to this issue if BGP multipath is enabled. Routers not configured for BGP multipath are not vulnerable to this issue. This issue affects: Juniper Networks Junos OS: 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2. Juniper Networks Junos OS Evolved: 21.1 versions prior to 21.1R3-S1-EVO; 21.2 version 21.2R1-EVO and later versions; 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 21.1. Juniper Networks Junos OS Evolved versions prior to 21.1-EVO. (CVE-2022-22213)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#TRUSTED 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
#TRUST-RSA-SHA256 73cf56a9aafff3e92c8caeddd709023ff8cfeeee155e69bd6a07568ad17c73e2dbf6835b07603998fada3349e1deee8fa4b0b45987b3c9cf70ee830848a4cca07d767b49a8ab022d4e11913097f790a164f0d524b642b02d86fe6b4ebbe5dd3822b73b804e052b5f1982ac0702f866bfedaa1ccab2aae900445ecd93e0f87196c0edce4050c721fdf394f87f88ddb689f46416362d7e2d32c9bd7badde1221a06823ac591a8661f47c9cb02efd509837cb5e08b00bd77a918e69d4e9519f72e353db89b4a998fa2b792fbcd41580ac3d662c0e4350070862bb0577f9e212de5964ef8f1767b156301de3cffc060b007d125ebb0b3d402ea129694f197631a42c18f10be4eb00d5349250cbb782f734274e2486e9532850c0909558209bd987c3d3ae906d9213bae53c0006f079d9436a3121ab030fbe0223c3f733a6d24074b56d7dad43ad10beac7a6e465c68ea2d4ab9dc957ae4933d8eb8d1f1c41f237db5907ebdac41ba64fbfba548b9336cafd5bdcaf934d267b0c3c8bce2ea58ce866ff2009333c3e286e4760f527fa78a0bc9a4e4a3c4e023bcb905f664f0ab853a8d910a474ac312a78a70ea60a2e69f1d195cb03a8a54d198087d084ca7d6c8277fe4d338dbf30cd78e694e050c7c8507fa9f0cbed2612ee79d5093b203ca6da87a6dfecfdedc738b223c1f7c7d92f3cbbd1911d860a712477a95c05371ae260a65
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(164339);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/18");

  script_cve_id("CVE-2022-22213");
  script_xref(name:"JSA", value:"JSA69717");
  script_xref(name:"IAVA", value:"2022-A-0280-S");

  script_name(english:"Juniper Junos OS Vulnerability (JSA69717)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The version of Junos OS installed on the remote host is affected by a vulnerability as referenced in the JSA69717
advisory.

  - A vulnerability in Handling of Undefined Values in the routing protocol daemon (RPD) process of Juniper
    Networks Junos OS and Junos OS Evolved may allow an unauthenticated network-based attacker to crash the
    RPD process by sending a specific BGP update while the system is under heavy load, leading to a Denial of
    Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service
    (DoS) condition. Malicious exploitation of this issue requires a very specific combination of load,
    timing, and configuration of the vulnerable system which is beyond the direct control of the attacker.
    Internal reproduction has only been possible through artificially created load and specially instrumented
    source code. Systems are only vulnerable to this issue if BGP multipath is enabled. Routers not configured
    for BGP multipath are not vulnerable to this issue. This issue affects: Juniper Networks Junos OS: 21.1
    versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2,
    21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2. Juniper Networks Junos OS Evolved: 21.1 versions prior
    to 21.1R3-S1-EVO; 21.2 version 21.2R1-EVO and later versions; 21.3 versions prior to 21.3R3-EVO; 21.4
    versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect: Juniper Networks Junos OS
    versions prior to 21.1. Juniper Networks Junos OS Evolved versions prior to 21.1-EVO. (CVE-2022-22213)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://supportportal.juniper.net/s/article/Overview-of-the-Juniper-Networks-SIRT-Quarterly-Security-Bulletin-Publication-Process
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?99086ea4");
  # https://supportportal.juniper.net/s/article/In-which-releases-are-vulnerabilities-fixed
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b616ed59");
  # https://supportportal.juniper.net/s/article/Common-Vulnerability-Scoring-System-CVSS-and-Juniper-s-Security-Advisories
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0d4fd08b");
  # https://supportportal.juniper.net/s/article/2022-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Denial-of-Service-DoS-vulnerability-in-RPD-upon-receipt-of-specific-BGP-update-CVE-2022-22213
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?eee78d4c");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant Junos software release referenced in Juniper advisory JSA69717");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-22213");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/07/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/07/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/08/23");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:junos");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Junos Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("junos_version.nasl");
  script_require_keys("Host/Juniper/JUNOS/Version");

  exit(0);
}

include('junos.inc');
include('junos_kb_cmd_func.inc');

var ver = get_kb_item_or_exit('Host/Juniper/JUNOS/Version');

if (ver =~ 'EVO')
{
  var vuln_ranges = [
    {'min_ver':'21.1', 'fixed_ver':'21.1R3-S1-EVO'},
    {'min_ver':'21.2', 'fixed_ver':'21.2R1-EVO'},
    {'min_ver':'21.3', 'fixed_ver':'21.3R3-EVO'},
    {'min_ver':'21.4', 'fixed_ver':'21.4R1-S1-EVO', 'fixed_display':'21.4R1-S1-EVO, 21.4R2-EVO'}
  ];
}
else
{
  var vuln_ranges = [
    {'min_ver':'21.1', 'fixed_ver':'21.1R3-S1'},
    {'min_ver':'21.2', 'fixed_ver':'21.2R2-S2', 'fixed_display':'21.2R2-S2, 21.2R3'},
    {'min_ver':'21.3', 'fixed_ver':'21.3R2', 'fixed_display':'21.3R2, 21.3R3'},
    {'min_ver':'21.4', 'fixed_ver':'21.4R1-S1', 'fixed_display':'21.4R1-S1, 21.4R2'}
  ];
}

var override = TRUE;
var buf = junos_command_kb_item(cmd:'show configuration | display set');
if (buf)
{
  override = FALSE;
  if (!preg(string:buf, pattern:"^set protocols bgp.*multipath"))
    audit(AUDIT_HOST_NOT, 'using a vulnerable configuration');
}

var fix = junos_compare_range(target_version:ver, vuln_ranges:vuln_ranges);
if (empty_or_null(fix)) audit(AUDIT_INST_VER_NOT_VULN, 'Junos OS', ver);
junos_report(ver:ver, fix:fix, override:override, severity:SECURITY_WARNING);

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

38.4%

Related for JUNIPER_JSA69717.NASL