Lucene search

K
JuniperJunos Os Evolved19.3

16 matches found

CVE
CVE
added 2021/07/15 8:15 p.m.202 views

CVE-2021-0286

A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all tra...

7.8CVSS7.5AI score0.00153EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.95 views

CVE-2021-0291

An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource. A high rate of spe...

6.5CVSS6.2AI score0.00285EPSS
CVE
CVE
added 2021/01/15 6:15 p.m.92 views

CVE-2021-0211

An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain lea...

10CVSS9.4AI score0.00389EPSS
CVE
CVE
added 2021/01/15 6:15 p.m.79 views

CVE-2021-0208

An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condi...

8.8CVSS8.6AI score0.00167EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.65 views

CVE-2021-31350

An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the...

9CVSS8AI score0.00342EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.51 views

CVE-2021-0264

A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of Service (DoS). Con...

7.5CVSS6.4AI score0.00241EPSS
CVE
CVE
added 2023/01/13 12:15 a.m.49 views

CVE-2023-22407

An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). An rpd crash can occur when an MPLS TE tunnel configuration change occurs on a directly connect...

6.5CVSS6.4AI score0.00119EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.47 views

CVE-2022-22230

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause DoS (Denial of Service). If another router generates more than one specific valid OSPFv3 LSA then rpd will crash whi...

6.5CVSS6.5AI score0.00046EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.46 views

CVE-2020-1644

On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBGP multihop deployme...

7.5CVSS7.4AI score0.00389EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.44 views

CVE-2021-0298

A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial...

4.7CVSS4.9AI score0.00033EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.43 views

CVE-2020-1638

The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plane filtering, will be able to cause the FPC restar...

7.5CVSS7.4AI score0.00389EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.43 views

CVE-2021-0259

Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a ...

7.4CVSS7.2AI score0.00107EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.41 views

CVE-2021-0236

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of ...

6.8CVSS6.4AI score0.00222EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.36 views

CVE-2020-1681

Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt o...

6.5CVSS6.3AI score0.00314EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.31 views

CVE-2020-1666

The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive ...

7.2CVSS6.5AI score0.00042EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.31 views

CVE-2021-0225

An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An administrator can use the following CLI command to see...

5.8CVSS5.8AI score0.00187EPSS