Lucene search

K
JuniperJunos17.4

183 matches found

CVE
CVE
added 2018/10/10 6:29 p.m.55 views

CVE-2018-0058

Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of Broadband Edge (BBE) client route processing on MX Series subscriber management platforms, introduced by the Tomcat (Next Gen...

7.8CVSS6.2AI score0.00363EPSS
CVE
CVE
added 2020/04/09 11:15 p.m.55 views

CVE-2020-1633

Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, le...

7.4CVSS6.6AI score0.00107EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.55 views

CVE-2021-0258

A vulnerability in the forwarding of transit TCPv6 packets received on the Ethernet management interface of Juniper Networks Junos OS allows an attacker to trigger a kernel panic, leading to a Denial of Service (DoS). Continued receipt and processing of these transit packets will create a sustained...

7.1CVSS5.5AI score0.00202EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.55 views

CVE-2021-0280

Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QFX10K Series with Paradise (PE) chipset-based line cards, ddos-protection configuration changes made from the CLI will not take effect as expected beyond the default DDoS (Distributed Denial of Servic...

7.5CVSS7.4AI score0.00389EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.55 views

CVE-2021-31377

An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the filesystem of Junos OS allows a local authenticated attacker to cause routing process daemon (RPD) to crash and restart, causing a Denial of Service (DoS). Repeated actions by the attacker will create a ...

5.5CVSS5.3AI score0.00034EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.54 views

CVE-2019-0035

When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to...

7.2CVSS6.7AI score0.00039EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.54 views

CVE-2020-1637

A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP addr...

7.2CVSS6.6AI score0.00186EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.54 views

CVE-2020-1657

On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of the...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.54 views

CVE-2021-0288

A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash and lead to a Denial of Service (DoS) condition. Continued receipt of this packet will sustain the ...

6.5CVSS6.5AI score0.00081EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.53 views

CVE-2019-0011

The Junos OS kernel crashes after processing a specific incoming packet to the out of band management interface (such as fxp0, me0, em0, vme0) destined for another address. By continuously sending this type of packet, an attacker can repeatedly crash the kernel causing a sustained Denial of Service...

6.5CVSS6.3AI score0.00115EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.53 views

CVE-2021-0234

Due to an improper Initialization vulnerability on Juniper Networks Junos OS QFX5100-96S devices with QFX 5e Series image installed, ddos-protection configuration changes will not take effect beyond the default DDoS (Distributed Denial of Service) settings when configured from the CLI. The DDoS pro...

5.8CVSS5.8AI score0.00268EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.53 views

CVE-2021-0281

On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition. Continued rec...

7.5CVSS6.5AI score0.00277EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.53 views

CVE-2021-31364

An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traff...

5.9CVSS6.1AI score0.00224EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.53 views

CVE-2021-31366

An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber management / BBE allows an adjacent attacker to cause a crash by sending a specific username. This impacts authentication, authorization, and accounting (...

6.5CVSS6.4AI score0.0023EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.53 views

CVE-2021-31370

An Incomplete List of Disallowed Inputs vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an adjacent unauthenticated attacker which sends a high rate of specific multicast traffic to cause control traffic received from the netwo...

6.5CVSS6.4AI score0.00084EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.53 views

CVE-2021-31378

In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be f...

7.5CVSS7AI score0.00275EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.53 views

CVE-2022-22226

In VxLAN scenarios on EX4300-MP, EX4600, QFX5000 Series devices an Uncontrolled Memory Allocation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated adjacently located attacker sending specific packets to cause a Denial of Service (DoS) condit...

6.5CVSS6.5AI score0.00087EPSS
CVE
CVE
added 2015/03/31 2:59 p.m.52 views

CVE-2014-9708

Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".

5CVSS8.9AI score0.0451EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.52 views

CVE-2018-0043

Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. This issue affects ...

8.8CVSS9AI score0.00679EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.52 views

CVE-2020-1601

Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) process allows an attacker...

7.5CVSS6.3AI score0.00405EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.52 views

CVE-2021-0253

NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networks Junos OS on NFX Series 17.2 version 17.2R...

7.8CVSS7.7AI score0.00438EPSS
CVE
CVE
added 2022/01/19 1:15 a.m.52 views

CVE-2022-22179

A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). In a scenario where DHCP relay or local...

6.5CVSS6.5AI score0.00063EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.51 views

CVE-2019-0001

Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet can result...

7.5CVSS7.5AI score0.00726EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.51 views

CVE-2019-0005

On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. This issue may allow IPv6 packets that should have been blocked to be forwarded. IPv4 packet filtering is unaffected by this vulnerability. Affected release...

5.3CVSS5.3AI score0.00209EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.51 views

CVE-2020-1608

Receipt of a specific MPLS or IPv6 packet on the core facing interface of an MX Series device configured for Broadband Edge (BBE) service may trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of packets destined to BBE clients connected to MX Ser...

7.8CVSS7.4AI score0.00552EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.51 views

CVE-2020-1618

On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password. This issue might only occur in certain scenarios: • At the first reboot after performing device factory reset using the command “reques...

6.9CVSS6.6AI score0.0004EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.51 views

CVE-2020-1665

On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to function while it is under DDoS attack, protecting bot...

5.3CVSS5.2AI score0.00233EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.51 views

CVE-2021-0275

A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user session must be active for the attack to succeed. Once successful, the attacker has the same privileges as...

9.3CVSS8.3AI score0.00531EPSS
CVE
CVE
added 2021/10/19 7:15 p.m.51 views

CVE-2021-31379

An Incorrect Behavior Order vulnerability in the MAP-E automatic tunneling mechanism of Juniper Networks Junos OS allows an attacker to send certain malformed IPv4 or IPv6 packets to cause a Denial of Service (DoS) to the PFE on the device which is disabled as a result of the processing of these pa...

7.5CVSS7.7AI score0.00345EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0012

A Denial of Service (DoS) vulnerability in BGP in Juniper Networks Junos OS configured as a VPLS PE allows an attacker to craft a specific BGP message to cause the routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extende...

7.5CVSS7.5AI score0.00406EPSS
CVE
CVE
added 2019/01/15 9:29 p.m.50 views

CVE-2019-0013

The routing protocol daemon (RPD) process will crash and restart when a specific invalid IPv4 PIM Join packet is received. While RPD restarts after a crash, repeated crashes can result in an extended Denial of Service (DoS) condition. This issue only affects IPv4 PIM. IPv6 PIM is unaffected by this...

7.5CVSS6.9AI score0.00308EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.50 views

CVE-2019-0038

Crafted packets destined to the management interface (fxp0) of an SRX340 or SRX345 services gateway may create a denial of service (DoS) condition due to buffer space exhaustion. This issue only affects the SRX340 and SRX345 services gateways. No other products or platforms are affected by this vul...

6.5CVSS6.6AI score0.00062EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.50 views

CVE-2019-0061

The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a l...

7.8CVSS7.6AI score0.00039EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.50 views

CVE-2019-0073

The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D180;...

7.1CVSS6.8AI score0.00033EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.50 views

CVE-2020-1688

On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. Exploitation of this vulnerability may allow an at...

6.5CVSS6.4AI score0.00054EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.50 views

CVE-2022-22250

An Improper Control of a Resource Through its Lifetime vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows unauthenticated adjacent attacker to cause a Denial of Service (DoS). In an EVPN-MPLS scenario, if MAC is learned locally on an access inte...

6.5CVSS6.6AI score0.00084EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.49 views

CVE-2018-0029

While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affects Junos OS 15.1 and later releases, and affects both single core and multi-core REs. Releases pri...

6.5CVSS6AI score0.00153EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.49 views

CVE-2021-0214

A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interruption, and a Denial of Service (DoS) condition. C...

6.5CVSS6.5AI score0.00031EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.48 views

CVE-2018-0030

Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. By continuously sending specific MPLS packets, an attacker can repeatedly crash the line cards or PTX1K causing a sustained Denial of Service. Affected releases are Juniper Netw...

7.5CVSS7.5AI score0.00608EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.48 views

CVE-2018-0054

On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. The following log message may also...

6.5CVSS6.4AI score0.00186EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.48 views

CVE-2019-0008

A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code executi...

9.8CVSS10AI score0.04767EPSS
CVE
CVE
added 2019/10/09 8:15 p.m.48 views

CVE-2019-0069

On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during device auth...

5.9CVSS5.6AI score0.0002EPSS
CVE
CVE
added 2021/07/15 8:15 p.m.48 views

CVE-2021-0295

A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) of Juniper Networks Junos OS on the QFX10K Series switches allows an attacker to trigger a packet forwarding loop, leading to a partial Denial of Service (DoS). The issue is caused by DVMRP packets looping on a multi-homed Et...

6.1CVSS6AI score0.00106EPSS
CVE
CVE
added 2022/01/19 1:15 a.m.48 views

CVE-2022-22160

An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS). In a subscriber management / broadband edge environment if a single session group...

6.5CVSS6.5AI score0.00195EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.47 views

CVE-2018-0048

A vulnerability in the Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support can allow a network based unauthenticated attacker to cause a severe memory exhaustion condition on the device. This can have an adverse impact on the system performance and availability. This issue o...

7.5CVSS7.6AI score0.02348EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.47 views

CVE-2019-0019

When BGP tracing is enabled an incoming BGP message may cause the Junos OS routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extended DoS condition. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to ...

7.5CVSS7.5AI score0.00494EPSS
CVE
CVE
added 2019/04/10 8:29 p.m.47 views

CVE-2019-0037

In a Dynamic Host Configuration Protocol version 6 (DHCPv6) environment, the jdhcpd daemon may crash and restart upon receipt of certain DHCPv6 solicit messages received from a DHCPv6 client. By continuously sending the same crafted packet, an attacker can repeatedly crash the jdhcpd process causin...

7.5CVSS7.4AI score0.00226EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.47 views

CVE-2020-1602

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over the code execution of the JDHDCP process. This iss...

8.8CVSS7.9AI score0.0024EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.47 views

CVE-2020-1605

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily execute commands as root on the target device. This ...

8.8CVSS8.7AI score0.00205EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.47 views

CVE-2020-1615

The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the vMX instance without authorization. This issue af...

10CVSS9.6AI score0.0047EPSS
Total number of security vulnerabilities183