Lucene search

K
JuniperJunos17.3

173 matches found

CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0237

On Juniper Networks EX4300-MP Series, EX4600 Series, EX4650 Series, QFX5K Series deployed as a Virtual Chassis with a specific Layer 2 circuit configuration, Packet Forwarding Engine manager (FXPC) process may crash and restart upon receipt of specific layer 2 frames. Continued receipt and processi...

6.5CVSS6.4AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0241

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a specific DHCPv6 packet is received, resulting in a restart of the daemon. The daemon automat...

7.4CVSS6.6AI score0.00107EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0247

A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback filter on any interfaces of a device. This issue is...

6.8CVSS5.3AI score0.00231EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0254

A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to remote code execution (RCE). Continued rece...

9.8CVSS10AI score0.0064EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0255

A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permissions enabled and is owned by the root user,...

7.8CVSS6.7AI score0.00021EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0256

A sensitive information disclosure vulnerability in the mosquitto message broker of Juniper Networks Junos OS may allow a locally authenticated user with shell access the ability to read portions of sensitive files, such as the master.passwd file. Since mosquitto is shipped with setuid permissions ...

5.5CVSS5.2AI score0.00035EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0257

On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause ...

6.5CVSS6.5AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0260

An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) service of Juniper Networks Junos OS leads an unauthenticated attacker being able to perform SNMP read actions, an Exposure of System Data to an Unauthorized Control Sphere, or write actions to OIDs tha...

7.5CVSS7.2AI score0.00877EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0261

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for these services by sending a high number of ...

7.5CVSS7.5AI score0.00438EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.39 views

CVE-2018-0032

The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this adviso...

7.5CVSS7.4AI score0.00536EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.38 views

CVE-2020-1640

An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuou...

7.5CVSS7.6AI score0.00448EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.38 views

CVE-2020-1670

On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. This specific packets can originate only from within the broadcast domain where the device is c...

6.5CVSS6.3AI score0.00212EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.38 views

CVE-2021-0227

An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets. Continued receipt and processing of these packets will creat...

7.5CVSS7.6AI score0.01187EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.38 views

CVE-2021-0229

An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (...

5.3CVSS5.2AI score0.00526EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.37 views

CVE-2020-1656

The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to pote...

8.8CVSS9AI score0.00447EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.37 views

CVE-2021-0245

A Use of Hard-coded Credentials vulnerability in Juniper Networks Junos OS on Junos Fusion satellite devices allows an attacker who is local to the device to elevate their privileges and take control of the device. This issue affects: Juniper Networks Junos OS Junos Fusion Satellite Devices. 16.1 v...

7.8CVSS7.8AI score0.00038EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.36 views

CVE-2020-1672

On Juniper Networks Junos OS devices configured with DHCPv6 relay enabled, receipt of a specific DHCPv6 packet might crash the jdhcpd daemon. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading...

7.5CVSS7.5AI score0.00288EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.36 views

CVE-2020-1687

On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traf...

6.5CVSS6.4AI score0.00081EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.35 views

CVE-2020-1630

A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification. Thi...

5.5CVSS5.4AI score0.0003EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.35 views

CVE-2020-1641

A Race Condition vulnerability in Juniper Networks Junos OS LLDP implementation allows an attacker to cause LLDP to crash leading to a Denial of Service (DoS). This issue occurs when crafted LLDP packets are received by the device from an adjacent device. Multiple LACP flaps will occur after LLDP c...

6.5CVSS6.4AI score0.00063EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.34 views

CVE-2020-1609

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on the target device. This ...

8.8CVSS8.7AI score0.00203EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.31 views

CVE-2020-1662

On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit configuration...

7.5CVSS7.6AI score0.00615EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.29 views

CVE-2020-1667

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability, mspm...

8.3CVSS8.3AI score0.00311EPSS
Total number of security vulnerabilities173