Lucene search

K
JuniperJunos15.1x49

134 matches found

CVE
CVE
added 2020/05/04 10:15 a.m.975 views

CVE-2020-1631

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclusion (LFI) or path traversal. Using this vulnerabi...

9.8CVSS9.7AI score0.05639EPSS
CVE
CVE
added 2020/03/06 3:15 p.m.649 views

CVE-2020-10188

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

10CVSS9.9AI score0.11181EPSS
CVE
CVE
added 2016/03/09 11:59 p.m.502 views

CVE-2016-1286

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.

8.6CVSS8.2AI score0.71553EPSS
CVE
CVE
added 2016/03/09 11:59 p.m.424 views

CVE-2016-1285

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interfa...

6.8CVSS7.2AI score0.67839EPSS
CVE
CVE
added 2017/07/17 1:18 p.m.176 views

CVE-2017-2345

On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial denial of service condition. Additionally, it may ...

9.8CVSS8.6AI score0.86397EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.161 views

CVE-2019-0044

Receipt of a specific packet on the out-of-band management interface fxp0 may cause the system to crash and restart (vmcore). By continuously sending a specially crafted packet to the fxp0 interface, an attacker can repetitively crash the rpd process causing prolonged Denial of Service (DoS). Affec...

7.5CVSS7.5AI score0.00566EPSS
CVE
CVE
added 2019/07/11 8:15 p.m.153 views

CVE-2019-0053

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the...

7.8CVSS7.7AI score0.00077EPSS
CVE
CVE
added 2019/07/11 8:15 p.m.144 views

CVE-2019-0052

The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash. This issue affects all SRX Series platforms that support URL-Filtering and have web...

7.8CVSS7.5AI score0.00353EPSS
CVE
CVE
added 2020/02/28 11:15 p.m.143 views

CVE-2015-5361

Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extens...

6.5CVSS6.3AI score0.00146EPSS
CVE
CVE
added 2021/01/15 6:15 p.m.92 views

CVE-2021-0211

An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain lea...

10CVSS9.4AI score0.00389EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.85 views

CVE-2020-1684

On Juniper Networks SRX Series configured with application identification inspection enabled, receipt of specific HTTP traffic can cause high CPU load utilization, which could lead to traffic interruption. Application identification is enabled by default and is automatically turned on when Intrusio...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2021/01/15 6:15 p.m.79 views

CVE-2021-0208

An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condi...

8.8CVSS8.6AI score0.00167EPSS
CVE
CVE
added 2021/01/15 6:15 p.m.79 views

CVE-2021-0215

On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart. An administra...

6.5CVSS6.5AI score0.00107EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.75 views

CVE-2018-0001

A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prio...

9.8CVSS9.8AI score0.05904EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.67 views

CVE-2019-0055

A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing ...

7.5CVSS7.5AI score0.00408EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.62 views

CVE-2019-0075

A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an extended denial of service condition. Affected releas...

7.5CVSS7.6AI score0.00389EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.61 views

CVE-2018-0016

Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram if 'clns-routing' or ES-IS is explicitly con...

9.8CVSS7.9AI score0.15174EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.59 views

CVE-2018-0007

An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. ...

10CVSS9.7AI score0.00459EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.59 views

CVE-2019-0003

When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. Affected...

7.5CVSS6AI score0.00803EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.58 views

CVE-2019-0068

The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Ne...

7.5CVSS7AI score0.00277EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.58 views

CVE-2020-1606

A path traversal vulnerability in the Juniper Networks Junos OS device may allow an authenticated J-web user to read files with 'world' readable permission and delete files with 'world' writeable permission. This issue does not affect system files that can be accessed only by root user. This issue ...

8.1CVSS6.5AI score0.00319EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.56 views

CVE-2019-0066

An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the dev...

7.5CVSS7.5AI score0.00467EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.55 views

CVE-2018-0021

If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys are at risk to an increased likelihood that ...

8.8CVSS8.8AI score0.00169EPSS
CVE
CVE
added 2017/07/17 1:18 p.m.54 views

CVE-2017-2348

The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other Juniper Networks pr...

7.5CVSS7.5AI score0.00451EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.54 views

CVE-2018-0004

A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversel...

7.1CVSS6.8AI score0.00288EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.54 views

CVE-2018-0009

On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewall bypass condition...

5.9CVSS6AI score0.00252EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.54 views

CVE-2019-0035

When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to...

7.2CVSS6.7AI score0.00039EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.54 views

CVE-2020-1637

A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP addr...

7.2CVSS6.6AI score0.00186EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.54 views

CVE-2020-1657

On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of the...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2017/10/13 5:29 p.m.53 views

CVE-2016-4921

By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion an...

7.8CVSS7.3AI score0.01351EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.53 views

CVE-2018-0018

On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other internal devices, systems or services protected by ...

7.5CVSS6.6AI score0.00207EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.53 views

CVE-2018-0019

A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt the network monitoring via SNMP, it does not...

5.9CVSS5.9AI score0.00337EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.53 views

CVE-2018-0025

When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-...

8.1CVSS7.1AI score0.00231EPSS
CVE
CVE
added 2015/03/31 2:59 p.m.52 views

CVE-2014-9708

Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".

5CVSS8.9AI score0.0451EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.52 views

CVE-2018-0043

Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. This issue affects ...

8.8CVSS9AI score0.00679EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.52 views

CVE-2019-0010

An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected by UTM consumes mbufs which ...

7.5CVSS7.7AI score0.01114EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.52 views

CVE-2019-0060

The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs...

7.5CVSS7.7AI score0.00408EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.52 views

CVE-2020-1601

Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) process allows an attacker...

7.5CVSS6.3AI score0.00405EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.52 views

CVE-2021-31355

A persistent cross-site scripting (XSS) vulnerability in the captive portal graphical user interface of Juniper Networks Junos OS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow...

8CVSS5.8AI score0.00329EPSS
CVE
CVE
added 2017/07/17 1:18 p.m.51 views

CVE-2017-10602

A buffer overflow vulnerability in Junos OS CLI may allow a local authenticated user with read only privileges and access to Junos CLI, to execute code with root privileges. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D46 on EX2200/VC, EX3200, EX3300/VC, EX420...

7.8CVSS7.4AI score0.00071EPSS
CVE
CVE
added 2017/07/17 1:18 p.m.51 views

CVE-2017-10605

On all vSRX and SRX Series devices, when the DHCP or DHCP relay is configured, specially crafted packet might cause the flowd process to crash, halting or interrupting traffic from flowing through the device(s). Repeated crashes of the flowd process may constitute an extended denial of service cond...

8.6CVSS7.7AI score0.00772EPSS
CVE
CVE
added 2017/07/17 1:18 p.m.51 views

CVE-2017-2349

A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 prior to 12.1X44-D60; 12.1X46 p...

9.9CVSS9.5AI score0.03099EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.51 views

CVE-2018-0022

A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform dependent. The following command provides the number o...

7.8CVSS7.6AI score0.01351EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.51 views

CVE-2021-0275

A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user session must be active for the attack to succeed. Once successful, the attacker has the same privileges as...

9.3CVSS8.3AI score0.00531EPSS
CVE
CVE
added 2017/04/24 3:59 p.m.50 views

CVE-2017-2313

Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS ver...

7.5CVSS7.4AI score0.00511EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.50 views

CVE-2018-0002

On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in a...

8.2CVSS6.9AI score0.0184EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.50 views

CVE-2018-0003

A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Junip...

6.5CVSS6.4AI score0.00224EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.50 views

CVE-2018-0008

An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a problem during norm...

7.2CVSS6.9AI score0.00293EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0012

A Denial of Service (DoS) vulnerability in BGP in Juniper Networks Junos OS configured as a VPLS PE allows an attacker to craft a specific BGP message to cause the routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extende...

7.5CVSS7.5AI score0.00406EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0013

The routing protocol daemon (RPD) process will crash and restart when a specific invalid IPv4 PIM Join packet is received. While RPD restarts after a crash, repeated crashes can result in an extended Denial of Service (DoS) condition. This issue only affects IPv4 PIM. IPv6 PIM is unaffected by this...

7.5CVSS6.9AI score0.00308EPSS
Total number of security vulnerabilities134