Lucene search

K

Juniper Networks Security Vulnerabilities

cve
cve

CVE-2020-1686

On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine. An attacker can repeatedly send the offending packet resulting in an extended Denial of.....

7.5CVSS

7.4AI Score

0.001EPSS

2020-10-16 09:15 PM
38
2
cve
cve

CVE-2020-1689

On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone...

6.5CVSS

6.3AI Score

0.001EPSS

2020-10-16 09:15 PM
19
cve
cve

CVE-2020-1687

On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and...

6.5CVSS

6.4AI Score

0.001EPSS

2020-10-16 09:15 PM
18
cve
cve

CVE-2020-1683

On Juniper Networks Junos OS devices, a specific SNMP OID poll causes a memory leak which over time leads to a kernel crash (vmcore). Prior to the kernel crash other processes might be impacted, such as failure to establish SSH connection to the device. The administrator can monitor the output of.....

7.5CVSS

7.4AI Score

0.001EPSS

2020-10-16 09:15 PM
17
cve
cve

CVE-2020-1682

An input validation vulnerability exists in Juniper Networks Junos OS, allowing an attacker to crash the srxpfe process, causing a Denial of Service (DoS) through the use of specific maintenance commands. The srxpfe process restarts automatically, but continuous execution of the commands could...

5.5CVSS

5.7AI Score

0.0004EPSS

2020-10-16 09:15 PM
19
cve
cve

CVE-2020-1675

When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI....

8.3CVSS

8.2AI Score

0.001EPSS

2020-10-16 09:15 PM
23
3
cve
cve

CVE-2020-1671

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue...

7.5CVSS

7.4AI Score

0.001EPSS

2020-10-16 09:15 PM
22
cve
cve

CVE-2020-1677

When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue...

7.2CVSS

7AI Score

0.001EPSS

2020-10-16 09:15 PM
19
cve
cve

CVE-2020-1679

On Juniper Networks PTX and QFX Series devices with packet sampling configured using tunnel-observation mpls-over-udp, sampling of a malformed packet can cause the Kernel Routing Table (KRT) queue to become stuck. KRT is the module within the Routing Process Daemon (RPD) that synchronized the...

7.5CVSS

7.6AI Score

0.001EPSS

2020-10-16 09:15 PM
20
3
cve
cve

CVE-2020-1673

Insufficient Cross-Site Scripting (XSS) protection in Juniper Networks J-Web and web based (HTTP/HTTPS) services allows an unauthenticated attacker to hijack the target user's HTTP/HTTPS session and perform administrative actions on the Junos device as the targeted user. This issue only affects...

8.8CVSS

8.1AI Score

0.002EPSS

2020-10-16 09:15 PM
17
cve
cve

CVE-2020-1680

On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An...

5.3CVSS

5.2AI Score

0.001EPSS

2020-10-16 09:15 PM
20
cve
cve

CVE-2020-1678

On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task memory detail | match.....

6.5CVSS

6.5AI Score

0.001EPSS

2020-10-16 09:15 PM
27
cve
cve

CVE-2020-1672

On Juniper Networks Junos OS devices configured with DHCPv6 relay enabled, receipt of a specific DHCPv6 packet might crash the jdhcpd daemon. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd,...

7.5CVSS

7.4AI Score

0.001EPSS

2020-10-16 09:15 PM
19
cve
cve

CVE-2020-1676

When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper...

7.2CVSS

7.1AI Score

0.001EPSS

2020-10-16 09:15 PM
21
cve
cve

CVE-2020-1665

On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to function while it is under DDoS attack, protecting...

5.3CVSS

5.2AI Score

0.001EPSS

2020-10-16 09:15 PM
34
cve
cve

CVE-2020-1669

The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local...

6.3CVSS

6.2AI Score

0.0004EPSS

2020-10-16 09:15 PM
20
cve
cve

CVE-2020-1670

On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. This specific packets can originate only from within the broadcast domain where the device is.....

6.5CVSS

6.3AI Score

0.001EPSS

2020-10-16 09:15 PM
20
6
cve
cve

CVE-2020-1656

The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to...

8.8CVSS

8.9AI Score

0.015EPSS

2020-10-16 09:15 PM
17
cve
cve

CVE-2020-1664

A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege. This issue affects Juniper Networks Junos OS:.....

7.8CVSS

7.9AI Score

0.0004EPSS

2020-10-16 09:15 PM
22
2
cve
cve

CVE-2020-1661

On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet. This issue only affects devices configured as DHCP forwarder with forward-only option, that...

5.3CVSS

5.3AI Score

0.001EPSS

2020-10-16 09:15 PM
17
cve
cve

CVE-2020-1657

On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of...

7.5CVSS

7.5AI Score

0.001EPSS

2020-10-16 09:15 PM
28
cve
cve

CVE-2020-1666

The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive....

6.6CVSS

6.4AI Score

0.001EPSS

2020-10-16 09:15 PM
17
cve
cve

CVE-2020-1660

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the....

9.9CVSS

8.9AI Score

0.001EPSS

2020-10-16 09:15 PM
35
cve
cve

CVE-2020-1662

On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit...

7.5CVSS

7.6AI Score

0.001EPSS

2020-10-16 09:15 PM
17
cve
cve

CVE-2020-1667

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability,...

8.3CVSS

8.1AI Score

0.001EPSS

2020-10-16 09:15 PM
14
cve
cve

CVE-2020-1668

On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when multicast packets are received by the layer 2 interface. To check if the device has high CPU load...

6.5CVSS

6.3AI Score

0.001EPSS

2020-10-16 09:15 PM
19
cve
cve

CVE-2020-1655

When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of large packets requiring fragmentation,...

5.3CVSS

5.2AI Score

0.001EPSS

2020-07-17 07:15 PM
24
cve
cve

CVE-2020-1650

On Juniper Networks Junos MX Series with service card configured, receipt of a stream of specific packets may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending these specific packets, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a prolonged Denial of.....

7.5CVSS

7.6AI Score

0.001EPSS

2020-07-17 07:15 PM
26
cve
cve

CVE-2020-1646

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when.....

7.5CVSS

7.5AI Score

0.001EPSS

2020-07-17 07:15 PM
21
cve
cve

CVE-2020-1648

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an...

7.5CVSS

7.4AI Score

0.001EPSS

2020-07-17 07:15 PM
27
cve
cve

CVE-2020-1651

On Juniper Networks MX series, receipt of a stream of specific Layer 2 frames may cause a memory leak resulting in the packet forwarding engine (PFE) on the line card to crash and restart, causing traffic interruption. By continuously sending this stream of specific layer 2 frame, an attacker...

6.5CVSS

6.3AI Score

0.001EPSS

2020-07-17 07:15 PM
81
cve
cve

CVE-2020-1653

On Juniper Networks Junos OS devices, a stream of TCP packets sent to the Routing Engine (RE) may cause mbuf leak which can lead to Flexible PIC Concentrator (FPC) crash or the system to crash and restart (vmcore). This issue can be trigged by IPv4 or IPv6 and it is caused only by TCP packets....

7.5CVSS

7.5AI Score

0.001EPSS

2020-07-17 07:15 PM
22
cve
cve

CVE-2020-1652

OpenNMS is accessible via port...

9.8CVSS

9.3AI Score

0.002EPSS

2020-07-17 07:15 PM
24
cve
cve

CVE-2020-1647

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. Continued processing of this specific HTTP...

9.8CVSS

9.5AI Score

0.009EPSS

2020-07-17 07:15 PM
28
cve
cve

CVE-2020-1649

When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of small fragments requiring reassembly,...

7.5CVSS

7.4AI Score

0.001EPSS

2020-07-17 07:15 PM
23
cve
cve

CVE-2020-1654

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, processing a malformed HTTP message can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) Continued processing of this malformed HTTP message may result in an extended Denial of....

9.8CVSS

9.5AI Score

0.009EPSS

2020-07-17 07:15 PM
21
cve
cve

CVE-2020-1644

On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBGP multihop...

7.5CVSS

7.4AI Score

0.001EPSS

2020-07-17 07:15 PM
27
cve
cve

CVE-2020-1641

A Race Condition vulnerability in Juniper Networks Junos OS LLDP implementation allows an attacker to cause LLDP to crash leading to a Denial of Service (DoS). This issue occurs when crafted LLDP packets are received by the device from an adjacent device. Multiple LACP flaps will occur after LLDP.....

6.5CVSS

6.3AI Score

0.001EPSS

2020-07-17 07:15 PM
17
2
cve
cve

CVE-2020-1645

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the....

8.3CVSS

8.2AI Score

0.001EPSS

2020-07-17 07:15 PM
33
cve
cve

CVE-2020-1640

An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By...

7.5CVSS

7.5AI Score

0.001EPSS

2020-07-17 07:15 PM
23
cve
cve

CVE-2020-1643

Execution of the "show ospf interface extensive" or "show ospf interface detail" CLI commands on a Juniper Networks device running Junos OS may cause the routing protocols process (RPD) to crash and restart if OSPF interface authentication is configured, leading to a Denial of Service (DoS). By...

5.5CVSS

5.6AI Score

0.0004EPSS

2020-07-17 07:15 PM
25
cve
cve

CVE-2020-1632

In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Service (DoS)...

8.6CVSS

8.4AI Score

0.001EPSS

2020-04-15 09:15 PM
42
cve
cve

CVE-2020-1633

Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded,...

7.4CVSS

6.4AI Score

0.001EPSS

2020-04-09 11:15 PM
39
cve
cve

CVE-2020-1628

Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet,...

5.3CVSS

5.1AI Score

0.001EPSS

2020-04-08 08:15 PM
28
cve
cve

CVE-2020-1637

A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP...

7.2CVSS

6.4AI Score

0.001EPSS

2020-04-08 08:15 PM
35
cve
cve

CVE-2020-1638

The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plane filtering, will be able to cause the FPC...

7.5CVSS

7.4AI Score

0.001EPSS

2020-04-08 08:15 PM
23
cve
cve

CVE-2020-1629

A race condition vulnerability on Juniper Network Junos OS devices may cause the routing protocol daemon (RPD) process to crash and restart while processing a BGP NOTIFICATION message. This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 16.2 versions prior to...

5.9CVSS

5.7AI Score

0.001EPSS

2020-04-08 08:15 PM
27
cve
cve

CVE-2020-1627

A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously...

7.5CVSS

7.5AI Score

0.001EPSS

2020-04-08 08:15 PM
22
cve
cve

CVE-2020-1630

A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification....

5.5CVSS

5.6AI Score

0.0004EPSS

2020-04-08 08:15 PM
22
cve
cve

CVE-2020-1634

On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. This issue affects both IPv4 and IPv6. This...

7.5CVSS

7.4AI Score

0.001EPSS

2020-04-08 08:15 PM
19
Total number of security vulnerabilities695