Lucene search

K
JuniperJunos Os Evolved

155 matches found

CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39517

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specifi...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.44 views

CVE-2021-0298

A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial...

4.7CVSS4.9AI score0.00033EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.44 views

CVE-2021-31358

A command injection vulnerability in sftp command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user. The vulnerability allows ...

7.8CVSS8AI score0.00125EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.44 views

CVE-2024-21611

A Missing Release of Memory after Effective Lifetime vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). In a Juniper Flow Monitoring (jflow) scenario route churn t...

7.5CVSS7.8AI score0.00185EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.44 views

CVE-2024-39556

A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code executio...

7.1CVSS6.6AI score0.0002EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.43 views

CVE-2020-1620

A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved prior to 19.3R1.

5.5CVSS5.4AI score0.00129EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.43 views

CVE-2020-1638

The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plane filtering, will be able to cause the FPC restar...

7.5CVSS7.4AI score0.00389EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.43 views

CVE-2021-0259

Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a ...

7.4CVSS7.2AI score0.00107EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.43 views

CVE-2022-22248

An Incorrect Permission Assignment vulnerability in shell processing of Juniper Networks Junos OS Evolved allows a low-privileged local user to modify the contents of a configuration file which could cause another user to execute arbitrary commands within the context of the follow-on user's session...

7.3CVSS7.3AI score0.00031EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.43 views

CVE-2023-28980

A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is i...

5.5CVSS5.4AI score0.00048EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.42 views

CVE-2020-1621

A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved prior to 19.3R1.

5.5CVSS5.4AI score0.00129EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.42 views

CVE-2020-1648

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an exte...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.42 views

CVE-2022-22208

A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service (DoS). When a BGP session flap happens, a Use After Free of a memory location that was assigned to anothe...

5.9CVSS5.8AI score0.00179EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.42 views

CVE-2023-28964

An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing o...

7.5CVSS7.5AI score0.00235EPSS
CVE
CVE
added 2023/10/13 12:15 a.m.42 views

CVE-2023-44184

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU...

6.5CVSS6.5AI score0.00134EPSS
CVE
CVE
added 2023/10/13 12:15 a.m.42 views

CVE-2023-44197

An Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved devices an rpd crash and restart can occur while pro...

7.5CVSS7.4AI score0.00145EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.42 views

CVE-2024-21585

An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing protocol daemon...

5.9CVSS5.8AI score0.0015EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.42 views

CVE-2024-39522

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.42 views

CVE-2024-39562

A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitima...

8.7CVSS7.5AI score0.00291EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.41 views

CVE-2020-1646

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when t...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.41 views

CVE-2021-0236

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of ...

6.8CVSS6.4AI score0.00222EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.41 views

CVE-2022-22239

An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authentic...

8.8CVSS8.6AI score0.00042EPSS
CVE
CVE
added 2023/07/14 6:15 p.m.41 views

CVE-2023-36840

A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and r...

5.5CVSS5.5AI score0.00069EPSS
CVE
CVE
added 2023/10/13 12:15 a.m.41 views

CVE-2023-44178

A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affect...

5.5CVSS5.8AI score0.00058EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.41 views

CVE-2024-39519

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). On all ACX 7000 Series platforms running Junos OS Evolv...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39554

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates wh...

8.2CVSS5.8AI score0.00269EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39555

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued rec...

8.7CVSS7.7AI score0.00676EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.40 views

CVE-2022-22247

An Improper Input Validation vulnerability in ingress TCP segment processing of Juniper Networks Junos OS Evolved allows a network-based unauthenticated attacker to send a crafted TCP segment to the device, triggering a kernel panic, leading to a Denial of Service (DoS) condition. Continued receipt...

7.5CVSS7.3AI score0.00035EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.40 views

CVE-2023-28967

A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by c...

7.5CVSS7.5AI score0.00161EPSS
CVE
CVE
added 2023/10/11 10:15 p.m.40 views

CVE-2023-44190

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to...

6.1CVSS5.7AI score0.0001EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.40 views

CVE-2024-39557

An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS)....

7.1CVSS6.6AI score0.00074EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.39 views

CVE-2021-0226

On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue...

7.5CVSS7.2AI score0.00536EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.39 views

CVE-2023-28982

A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an attribute of an active BG...

7.5CVSS7.5AI score0.00233EPSS
CVE
CVE
added 2023/10/11 9:15 p.m.39 views

CVE-2023-44187

An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system. This...

5.9CVSS5.6AI score0.00038EPSS
CVE
CVE
added 2023/10/11 10:15 p.m.39 views

CVE-2023-44189

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to thi...

6.1CVSS5.7AI score0.00006EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.38 views

CVE-2020-1622

A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1.

5.5CVSS5.4AI score0.00129EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.38 views

CVE-2021-0239

In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash ...

6.5CVSS6.4AI score0.002EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.38 views

CVE-2023-28960

An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system. A follow-on administrator could then inadverte...

8.2CVSS8AI score0.00043EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.38 views

CVE-2023-28981

An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is re...

6.5CVSS6.5AI score0.0006EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.37 views

CVE-2020-1624

A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.

5.5CVSS5.4AI score0.00119EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.37 views

CVE-2023-28973

An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability. Administrative functions such as daemon resta...

7.1CVSS7.2AI score0.00031EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.37 views

CVE-2024-21602

A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If a specific IPv4 UDP packet is received and sent to the Routing Engine (RE) packetio crashes ...

7.5CVSS7.5AI score0.00187EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.36 views

CVE-2020-1623

A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved prior to 19.2R1.

5.5CVSS5.2AI score0.00053EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.36 views

CVE-2020-1681

Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt o...

6.5CVSS6.3AI score0.00314EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.36 views

CVE-2024-21604

An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If a high rate of specific valid packets are processed by the routing engine (RE) this will ...

7.5CVSS7.4AI score0.00218EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.35 views

CVE-2022-22233

An Unchecked Return Value to NULL Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In Segment Routing (SR) to Label Distribution Protoc...

5.5CVSS5.3AI score0.00056EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.35 views

CVE-2022-22240

An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (D...

5.5CVSS5.6AI score0.00051EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.35 views

CVE-2023-28966

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an atta...

7.8CVSS7.6AI score0.00027EPSS
CVE
CVE
added 2023/07/14 6:15 p.m.35 views

CVE-2023-36849

An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). When a malformed LLDP packet is received, l2cpd wil...

6.5CVSS6.5AI score0.00085EPSS
CVE
CVE
added 2023/10/13 12:15 a.m.35 views

CVE-2023-44196

An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system. When specific transit MPLS packets are received by the...

6.5CVSS5.8AI score0.00102EPSS
Total number of security vulnerabilities155