Metrics
Affected Vendors & Products
Solution
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases.
Workaround
To apply a workaround exclude the MIB from being polled with the following configuration snippet: [snmp view cos oid 1.3.6.1.4.1.2636.3.15.4 exclude] [snmp community public view cos] Additionally, disable SNMP (disabled by default), utilize edge filtering with source-address validation (uRPF, etc.), access control lists (ACLs), and/or SNMPv3 authentication to limit access to the device only from trusted hosts. In addition to the workaround recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device to only trusted networks, administrators and hosts.
Link | Providers |
---|---|
https://kb.juniper.net/JSA69916 |
![]() ![]() |
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 12 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-05-12T14:45:58.936Z
Reserved: 2021-12-21T00:00:00.000Z
Link: CVE-2022-22211

Updated: 2024-08-03T03:07:49.929Z

Status : Modified
Published: 2022-10-18T03:15:09.413
Modified: 2024-11-21T06:46:24.087
Link: CVE-2022-22211

No data.

No data.