Lucene search

K
JuniperJunos15.1x53

16 matches found

CVE
CVE
added 2020/01/15 9:15 a.m.58 views

CVE-2020-1606

A path traversal vulnerability in the Juniper Networks Junos OS device may allow an authenticated J-web user to read files with 'world' readable permission and delete files with 'world' writeable permission. This issue does not affect system files that can be accessed only by root user. This issue ...

8.1CVSS6.5AI score0.00319EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.52 views

CVE-2020-1601

Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) process allows an attacker...

7.5CVSS6.3AI score0.00405EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.51 views

CVE-2020-1618

On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password. This issue might only occur in certain scenarios: • At the first reboot after performing device factory reset using the command “reques...

6.9CVSS6.6AI score0.0004EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.47 views

CVE-2020-1602

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over the code execution of the JDHDCP process. This iss...

8.8CVSS7.9AI score0.0024EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.47 views

CVE-2020-1605

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily execute commands as root on the target device. This ...

8.8CVSS8.7AI score0.00205EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.45 views

CVE-2020-1643

Execution of the "show ospf interface extensive" or "show ospf interface detail" CLI commands on a Juniper Networks device running Junos OS may cause the routing protocols process (RPD) to crash and restart if OSPF interface authentication is configured, leading to a Denial of Service (DoS). By con...

5.5CVSS5.6AI score0.00139EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.44 views

CVE-2020-1613

A vulnerability in the BGP FlowSpec implementation may cause a Juniper Networks Junos OS device to terminate an established BGP session upon receiving a specific BGP FlowSpec advertisement. The BGP NOTIFICATION message that terminates an established BGP session is sent toward the peer device that o...

8.6CVSS7.7AI score0.00453EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.43 views

CVE-2020-1600

In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causing a high CPU usage Denial of Service (DoS) condit...

6.8CVSS6.7AI score0.00222EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.43 views

CVE-2020-1639

When an attacker sends a specific crafted Ethernet Operation, Administration, and Maintenance (Ethernet OAM) packet to a target device, it may improperly handle the incoming malformed data and fail to sanitize this incoming data resulting in an overflow condition. This overflow condition in Juniper...

7.5CVSS7.5AI score0.00536EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.42 views

CVE-2020-1607

Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative actions on the Junos device as the targeted user. This issue affects Juniper Networks Junos OS 12.3 ver...

7.5CVSS6.3AI score0.00336EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.42 views

CVE-2020-1680

On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An unauthenticated...

5.3CVSS5.2AI score0.00299EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.37 views

CVE-2020-1656

The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to pote...

8.8CVSS9AI score0.00447EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.36 views

CVE-2020-1630

A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification. Thi...

5.5CVSS5.4AI score0.0003EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.35 views

CVE-2020-1641

A Race Condition vulnerability in Juniper Networks Junos OS LLDP implementation allows an attacker to cause LLDP to crash leading to a Denial of Service (DoS). This issue occurs when crafted LLDP packets are received by the device from an adjacent device. Multiple LACP flaps will occur after LLDP c...

6.5CVSS6.4AI score0.00063EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.34 views

CVE-2020-1609

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on the target device. This ...

8.8CVSS8.7AI score0.00203EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.34 views

CVE-2020-1661

On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet. This issue only affects devices configured as DHCP forwarder with forward-only option, that forwar...

5.3CVSS5.3AI score0.00268EPSS