Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-27354 | A Use After Free vulnerability in the Advanced Forwarding Toolkit (AFT) manager process (aftmand) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a kernel crash due to intensive polling of Abstracted Fabric (AF) interface statistics and thereby a Denial of Service (DoS). Continued gathering of AF interface statistics will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on MX Series: 20.1 versions later than 20.1R1; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2. |
Solution
The following Junos OS software releases have been updated to resolve this specific issue Junos OS: 20.2R3-S5, 20.3R3-S4, 20.4R3, 21.1R2, 21.2R2, 21.3R1, and all subsequent releases.
Workaround
There are no viable workarounds for this issue. To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted networks, hosts and users.
Link | Providers |
---|---|
https://kb.juniper.net/JSA69711 |
![]() ![]() |
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T23:45:53.701Z
Reserved: 2021-12-21T00:00:00
Link: CVE-2022-22207

No data.

Status : Modified
Published: 2022-07-20T15:15:08.580
Modified: 2024-11-21T06:46:23.577
Link: CVE-2022-22207

No data.

No data.