Lucene search

K
JuniperJunos15.1x53

17 matches found

CVE
CVE
added 2019/07/11 8:15 p.m.153 views

CVE-2019-0053

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the...

7.8CVSS7.7AI score0.00077EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.59 views

CVE-2019-0003

When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. Affected...

7.5CVSS6AI score0.00803EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.59 views

CVE-2019-0006

A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration. This issue can result in a crash of the fxpc daemon or may potentially lead to ...

9.8CVSS9.9AI score0.05923EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.56 views

CVE-2019-0066

An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the dev...

7.5CVSS7.5AI score0.00467EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.54 views

CVE-2019-0035

When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to...

7.2CVSS6.7AI score0.00039EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.53 views

CVE-2019-0009

On EX2300 and EX3400 series, high disk I/O operations may disrupt the communication between the routing engine (RE) and the packet forwarding engine (PFE). In a virtual chassis (VC) deployment, this issue disrupts communication between the VC members. This issue does not affect other Junos platform...

5.5CVSS5.4AI score0.00051EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.51 views

CVE-2019-0005

On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. This issue may allow IPv6 packets that should have been blocked to be forwarded. IPv4 packet filtering is unaffected by this vulnerability. Affected release...

5.3CVSS5.3AI score0.00209EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0012

A Denial of Service (DoS) vulnerability in BGP in Juniper Networks Junos OS configured as a VPLS PE allows an attacker to craft a specific BGP message to cause the routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extende...

7.5CVSS7.5AI score0.00406EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0013

The routing protocol daemon (RPD) process will crash and restart when a specific invalid IPv4 PIM Join packet is received. While RPD restarts after a crash, repeated crashes can result in an extended Denial of Service (DoS) condition. This issue only affects IPv4 PIM. IPv6 PIM is unaffected by this...

7.5CVSS6.9AI score0.00308EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.50 views

CVE-2019-0061

The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a l...

7.8CVSS7.6AI score0.00039EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.48 views

CVE-2019-0069

On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during device auth...

5.9CVSS5.6AI score0.0002EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.47 views

CVE-2019-0002

On EX2300 and EX3400 series, stateless firewall filter configuration that uses the action 'policer' in combination with other actions might not take effect. When this issue occurs, the output of the command: show pfe filter hw summary will not show the entry for: RACL group Affected releases are Ju...

9.8CVSS7.5AI score0.00289EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.43 views

CVE-2019-0040

On Junos OS, rpcbind should only be listening to port 111 on the internal routing instance (IRI). External packets destined to port 111 should be dropped. Due to an information leak vulnerability, responses were being generated from the source address of the management interface (e.g. fxp0) thus di...

9.1CVSS7.4AI score0.00146EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.43 views

CVE-2019-0062

A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R1...

8.8CVSS8.2AI score0.00357EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.42 views

CVE-2019-0043

In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By continuously sending a specially crafted SNMP packet, an attacker can repetitively crash the RPD process causing prolonged denial of service. No other Juniper Network...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.40 views

CVE-2019-0036

When configuring a stateless firewall filter in Junos OS, terms named using the format "internal-n" (e.g. "internal-1", "internal-2", etc.) are silently ignored. No warning is issued during configuration, and the config is committed without error, but the filter criteria will match all packets lead...

9.8CVSS8.3AI score0.00255EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.40 views

CVE-2019-0047

A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perform certain diagnostic actions on J-Web. This issue...

8.8CVSS7.8AI score0.00646EPSS