Lucene search

K
JuniperJunos Os Evolved21.3

11 matches found

CVE
CVE
added 2024/04/12 3:15 p.m.90 views

CVE-2024-21598

An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). If a BGP update is received over an established BGP sess...

8.7CVSS6.8AI score0.00112EPSS
CVE
CVE
added 2024/04/12 3:15 p.m.79 views

CVE-2024-30395

An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). If a BGP update is received over an established BGP session which contains a tunnel e...

8.7CVSS6.8AI score0.00146EPSS
CVE
CVE
added 2024/04/12 3:15 p.m.71 views

CVE-2024-21615

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configured, and a super-user perfo...

5.1CVSS6.3AI score0.00035EPSS
CVE
CVE
added 2024/04/16 8:15 p.m.69 views

CVE-2024-30380

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for laye...

7.1CVSS6.8AI score0.00102EPSS
CVE
CVE
added 2024/04/12 4:15 p.m.65 views

CVE-2024-30386

A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state updates are received and p...

7.1CVSS6.7AI score0.00078EPSS
CVE
CVE
added 2024/04/12 4:15 p.m.61 views

CVE-2024-30382

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial o...

8.7CVSS6.8AI score0.00493EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.50 views

CVE-2024-21613

A Missing Release of Memory after Effective Lifetime vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platform...

6.5CVSS6.4AI score0.00047EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.46 views

CVE-2024-21596

A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). If an attacker sends a specific BGP UPDATE message to the device, this will cause a...

5.3CVSS5.4AI score0.00075EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39513

An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS). When a specific "clear" command is run, the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-af...

6.8CVSS5.5AI score0.00033EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.42 views

CVE-2024-21585

An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing protocol daemon...

5.9CVSS5.8AI score0.0015EPSS
CVE
CVE
added 2024/01/12 1:15 a.m.25 views

CVE-2024-21612

An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, when specific TCP packets are...

7.5CVSS7.4AI score0.00187EPSS