Lucene search

K

27 matches found

CVE
CVE
added 2024/04/12 3:15 p.m.86 views

CVE-2024-21590

An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper Networks Junos OS Evolved allows an unauthenticated attacker within the MPLS administrative domain to send specifically crafted packets to the Routing Engine (RE) to cause a Denial of Service (DoS)....

7.1CVSS6.8AI score0.0004EPSS
CVE
CVE
added 2024/04/12 3:15 p.m.79 views

CVE-2024-30395

An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). If a BGP update is received over an established BGP session which contains a tunnel e...

8.7CVSS6.8AI score0.00146EPSS
CVE
CVE
added 2024/04/12 3:15 p.m.71 views

CVE-2024-21615

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configured, and a super-user perfo...

5.1CVSS6.3AI score0.00035EPSS
CVE
CVE
added 2024/04/16 8:15 p.m.69 views

CVE-2024-30380

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for laye...

7.1CVSS6.8AI score0.00102EPSS
CVE
CVE
added 2024/07/11 5:15 p.m.68 views

CVE-2024-39549

A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not pro...

8.7CVSS7.5AI score0.0024EPSS
CVE
CVE
added 2024/04/12 4:15 p.m.67 views

CVE-2024-30402

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When telemetry requests are sent to the device, and...

8.2CVSS6.8AI score0.00174EPSS
CVE
CVE
added 2024/04/12 4:15 p.m.65 views

CVE-2024-30386

A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state updates are received and p...

7.1CVSS6.7AI score0.00078EPSS
CVE
CVE
added 2024/04/12 4:15 p.m.61 views

CVE-2024-30382

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial o...

8.7CVSS6.8AI score0.00493EPSS
CVE
CVE
added 2024/04/12 4:15 p.m.59 views

CVE-2024-30390

An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane. When an incoming connection was blocked because it exceeded the conne...

6.9CVSS6.8AI score0.00076EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.58 views

CVE-2024-39521

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/04/12 3:15 p.m.57 views

CVE-2024-30394

A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when EVPN is confi...

8.7CVSS6.7AI score0.00247EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.52 views

CVE-2024-39514

An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker can send specific traffic to the device, which cause...

7.1CVSS6.6AI score0.00074EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.52 views

CVE-2024-39528

A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a routing-instance deactivation is triggered, and ...

6CVSS5.5AI score0.00209EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.52 views

CVE-2024-39558

An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (Do...

7.1CVSS6.4AI score0.00068EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.49 views

CVE-2024-39524

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.48 views

CVE-2024-39520

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.47 views

CVE-2024-39559

An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication en...

8.2CVSS6AI score0.00149EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.46 views

CVE-2024-39523

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39513

An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS). When a specific "clear" command is run, the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-af...

6.8CVSS5.5AI score0.00033EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39517

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specifi...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.44 views

CVE-2024-39556

A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code executio...

7.1CVSS6.6AI score0.0002EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.42 views

CVE-2024-39562

A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitima...

8.7CVSS7.5AI score0.00291EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.41 views

CVE-2024-39519

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). On all ACX 7000 Series platforms running Junos OS Evolv...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39554

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates wh...

8.2CVSS5.8AI score0.00269EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39555

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued rec...

8.7CVSS7.7AI score0.00676EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.40 views

CVE-2024-39557

An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS)....

7.1CVSS6.6AI score0.00074EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.25 views

CVE-2024-21612

An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, when specific TCP packets are...

7.5CVSS7.4AI score0.00187EPSS