CVE-2022-22178

7.5 HIGH

📋 TL;DR

A stack-based buffer overflow in Juniper's flow processing daemon (flowd) allows unauthenticated attackers to cause denial of service by sending specially crafted SIP invite packets. This affects Juniper Networks Junos OS on MX Series and SRX series with SIP ALG enabled, causing PIC reboots and traffic disruption. Organizations running affected versions with SIP ALG enabled are vulnerable.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS on MX Series
  • Juniper Networks Junos OS on SRX Series
Versions: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R2; 21.3 versions prior to 21.3R2
Operating Systems: Junos OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SIP ALG (Application Layer Gateway) is enabled. Versions prior to 20.4R1 are not affected.

📦 What is this software?

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained denial of service causing complete traffic disruption through affected PICs, requiring manual intervention to restore service.

🟠

Likely Case

Flowd crashes leading to PIC reboots and temporary traffic disruption until the system recovers, potentially causing intermittent service outages.

🟢

If Mitigated

Minimal impact if SIP ALG is disabled or systems are patched, with normal traffic flow maintained.

🌐 Internet-Facing: HIGH - Unauthenticated network attackers can trigger this remotely if SIP ALG is enabled and systems are exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires SIP ALG to be enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific SIP invite packets to trigger the buffer overflow. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.4R3-S2, 21.1R2-S1, 21.1R3, 21.2R2, 21.3R2 or later

Vendor Advisory: https://kb.juniper.net/JSA11284

Restart Required: Yes

Instructions:

1. Download appropriate patched version from Juniper support portal. 2. Backup current configuration. 3. Install update following Juniper upgrade procedures. 4. Reboot affected devices. 5. Verify version and functionality.

🔧 Temporary Workarounds

Disable SIP ALG

all

Disable the SIP Application Layer Gateway feature to prevent exploitation of this vulnerability

set security alg sip disable
commit

🧯 If You Can't Patch

  • Disable SIP ALG on all affected devices immediately
  • Implement network segmentation to restrict SIP traffic to affected devices

🔍 How to Verify

Check if Vulnerable:

Check Junos OS version with 'show version' and verify if SIP ALG is enabled with 'show security alg status'

Check Version:

show version

Verify Fix Applied:

Verify version is patched with 'show version' and confirm SIP ALG status if re-enabled

📡 Detection & Monitoring

Log Indicators:

  • Flowd crash logs
  • PIC reboot events
  • SIP ALG error messages
  • Denial of service alerts

Network Indicators:

  • Unusual SIP invite packets to affected devices
  • Traffic disruption patterns
  • PIC state changes

SIEM Query:

source="junos" AND ("flowd" OR "PIC") AND ("crash" OR "reboot" OR "SIP")

🔗 References

📤 Share & Export