Lucene search

K
JuniperJunos18.2x75

5 matches found

CVE
CVE
added 2018/10/10 6:29 p.m.46 views

CVE-2018-0049

A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interfa...

7.5CVSS7.3AI score0.01219EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.45 views

CVE-2018-0031

Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. The crafted UDP packets must be encapsulated and meet a very specific packet format to be classified in a way that bypasses IP firewall filter rules. The packets themselves do not cause a servic...

5.9CVSS5.3AI score0.0019EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0052

If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. There is no documented CLI command to enable this service. However, an undocumented CLI command allow...

9.3CVSS7.6AI score0.08911EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0055

Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. The daemon automatically restarts without intervention, but a continuous receipt of crafted DHCPv6 packets could leaded ...

6.5CVSS5.5AI score0.00241EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0061

A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D81 on SRX Series; 12.3 versions prior to 12.3R12-...

5.3CVSS5.3AI score0.0043EPSS