Lucene search

K
JuniperJunos19.2

199 matches found

CVE
CVE
added 2021/04/22 8:15 p.m.43 views

CVE-2021-0224

A vulnerability in the handling of internal resources necessary to bring up a large number of Layer 2 broadband remote access subscriber (BRAS) nodes in Juniper Networks Junos OS can cause the Access Node Control Protocol daemon (ANCPD) to crash and restart, leading to a Denial of Service (DoS) con...

6.5CVSS6.4AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.43 views

CVE-2021-0259

Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a ...

7.4CVSS7.2AI score0.00107EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.42 views

CVE-2020-1671

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue on...

7.5CVSS7.5AI score0.00389EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.42 views

CVE-2020-1680

On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An unauthenticated...

5.3CVSS5.2AI score0.00299EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.42 views

CVE-2021-0228

An improper check for unusual or exceptional conditions vulnerability in Juniper Networks MX Series platforms with Trio-based MPC (Modular Port Concentrator) deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, may allow an attacker sending specific Layer 2 traffic to cause...

6.5CVSS6.5AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.42 views

CVE-2021-0230

On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic w...

7.5CVSS7.6AI score0.00389EPSS
CVE
CVE
added 2022/10/18 3:15 a.m.42 views

CVE-2022-22208

A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service (DoS). When a BGP session flap happens, a Use After Free of a memory location that was assigned to anothe...

5.9CVSS5.8AI score0.00179EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.42 views

CVE-2023-28964

An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing o...

7.5CVSS7.5AI score0.00235EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.41 views

CVE-2020-1650

On Juniper Networks Junos MX Series with service card configured, receipt of a stream of specific packets may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending these specific packets, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a prolonged Denial of S...

7.5CVSS7.6AI score0.00389EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.41 views

CVE-2020-1653

On Juniper Networks Junos OS devices, a stream of TCP packets sent to the Routing Engine (RE) may cause mbuf leak which can lead to Flexible PIC Concentrator (FPC) crash or the system to crash and restart (vmcore). This issue can be trigged by IPv4 or IPv6 and it is caused only by TCP packets. This...

7.5CVSS7.5AI score0.00464EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.41 views

CVE-2020-1664

A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege. This issue affects Juniper Networks Junos OS: 1...

7.8CVSS8AI score0.00048EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.41 views

CVE-2021-0236

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of ...

6.8CVSS6.4AI score0.00222EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.41 views

CVE-2021-0240

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, the Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash if a malformed DHCPv6 packet is received, resulting in a restart of the daemon. The daemon automatically resta...

7.4CVSS6.6AI score0.00107EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.41 views

CVE-2021-0272

A kernel memory leak in QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016 devices Flexible PIC Concentrators (FPCs) on Juniper Networks Junos OS allows an attacker to send genuine packets destined to the device to cause a Denial of Service (DoS) to the device. On QFX10002-32Q, QFX10002-6...

6.5CVSS6.4AI score0.00066EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.40 views

CVE-2020-1673

Insufficient Cross-Site Scripting (XSS) protection in Juniper Networks J-Web and web based (HTTP/HTTPS) services allows an unauthenticated attacker to hijack the target user's HTTP/HTTPS session and perform administrative actions on the Junos device as the targeted user. This issue only affects Jun...

8.8CVSS8.4AI score0.01407EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.40 views

CVE-2020-1689

On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone co...

6.5CVSS6.3AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0237

On Juniper Networks EX4300-MP Series, EX4600 Series, EX4650 Series, QFX5K Series deployed as a Virtual Chassis with a specific Layer 2 circuit configuration, Packet Forwarding Engine manager (FXPC) process may crash and restart upon receipt of specific layer 2 frames. Continued receipt and processi...

6.5CVSS6.4AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0241

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a specific DHCPv6 packet is received, resulting in a restart of the daemon. The daemon automat...

7.4CVSS6.6AI score0.00107EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0247

A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback filter on any interfaces of a device. This issue is...

6.8CVSS5.3AI score0.00231EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0254

A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to remote code execution (RCE). Continued rece...

9.8CVSS10AI score0.0064EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0255

A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permissions enabled and is owned by the root user,...

7.8CVSS6.7AI score0.00021EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0256

A sensitive information disclosure vulnerability in the mosquitto message broker of Juniper Networks Junos OS may allow a locally authenticated user with shell access the ability to read portions of sensitive files, such as the master.passwd file. Since mosquitto is shipped with setuid permissions ...

5.5CVSS5.2AI score0.00035EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0257

On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause ...

6.5CVSS6.5AI score0.00081EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0260

An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) service of Juniper Networks Junos OS leads an unauthenticated attacker being able to perform SNMP read actions, an Exposure of System Data to an Unauthorized Control Sphere, or write actions to OIDs tha...

7.5CVSS7.2AI score0.00877EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.40 views

CVE-2021-0261

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for these services by sending a high number of ...

7.5CVSS7.5AI score0.00438EPSS
CVE
CVE
added 2023/04/17 10:15 p.m.40 views

CVE-2023-28968

An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowi...

5.3CVSS5.4AI score0.00273EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.39 views

CVE-2020-1654

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, processing a malformed HTTP message can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) Continued processing of this malformed HTTP message may result in an extended Denial of ...

9.8CVSS9.7AI score0.02129EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.39 views

CVE-2021-0235

On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series devices using tenant services on Juniper Networks Junos OS, due to incorrect permission scheme assigned to tenant system administrators, a tenant system administrator may inadvertently send their network traffic to on...

7.3CVSS7.1AI score0.00051EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.39 views

CVE-2021-0249

On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise impact the device by sending crafted packets to...

10CVSS9.3AI score0.00423EPSS
CVE
CVE
added 2020/07/17 7:15 p.m.38 views

CVE-2020-1640

An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuou...

7.5CVSS7.6AI score0.00448EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.38 views

CVE-2020-1670

On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. This specific packets can originate only from within the broadcast domain where the device is c...

6.5CVSS6.3AI score0.00212EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.38 views

CVE-2021-0227

An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets. Continued receipt and processing of these packets will creat...

7.5CVSS7.6AI score0.01187EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.38 views

CVE-2021-0229

An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (...

5.3CVSS5.2AI score0.00526EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.38 views

CVE-2021-0269

The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supersede existing parameters, including hardcoded pa...

8.8CVSS8.5AI score0.00375EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.37 views

CVE-2020-1656

The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to pote...

8.8CVSS9AI score0.00447EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.37 views

CVE-2020-1668

On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when multicast packets are received by the layer 2 interface. To check if the device has high CPU load du...

6.5CVSS6.3AI score0.00195EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.37 views

CVE-2020-1679

On Juniper Networks PTX and QFX Series devices with packet sampling configured using tunnel-observation mpls-over-udp, sampling of a malformed packet can cause the Kernel Routing Table (KRT) queue to become stuck. KRT is the module within the Routing Process Daemon (RPD) that synchronized the routi...

7.5CVSS7.7AI score0.00389EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.37 views

CVE-2021-0245

A Use of Hard-coded Credentials vulnerability in Juniper Networks Junos OS on Junos Fusion satellite devices allows an attacker who is local to the device to elevate their privileges and take control of the device. This issue affects: Juniper Networks Junos OS Junos Fusion Satellite Devices. 16.1 v...

7.8CVSS7.8AI score0.00038EPSS
CVE
CVE
added 2023/07/14 4:15 p.m.37 views

CVE-2023-36832

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series allows an unauthenticated network-based attacker to send specific packets to an Aggregated Multiservices (AMS) interface on the device, causing the packet forwarding engine (P...

7.5CVSS7.4AI score0.00197EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.36 views

CVE-2020-1672

On Juniper Networks Junos OS devices configured with DHCPv6 relay enabled, receipt of a specific DHCPv6 packet might crash the jdhcpd daemon. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading...

7.5CVSS7.5AI score0.00288EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.36 views

CVE-2020-1687

On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traf...

6.5CVSS6.4AI score0.00081EPSS
CVE
CVE
added 2020/04/08 8:15 p.m.35 views

CVE-2020-1630

A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification. Thi...

5.5CVSS5.4AI score0.0003EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.35 views

CVE-2020-1682

An input validation vulnerability exists in Juniper Networks Junos OS, allowing an attacker to crash the srxpfe process, causing a Denial of Service (DoS) through the use of specific maintenance commands. The srxpfe process restarts automatically, but continuous execution of the commands could lead...

5.5CVSS5.6AI score0.00047EPSS
CVE
CVE
added 2023/07/14 6:15 p.m.35 views

CVE-2023-36848

An Improper Handling of Undefined Values vulnerability in the periodic packet management daemon (PPMD) of Juniper Networks Junos OS on MX Series(except MPC10, MPC11 and LC9600) allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). When a malformed CFM packet is received, i...

6.5CVSS6.5AI score0.00081EPSS
CVE
CVE
added 2020/01/15 9:15 a.m.34 views

CVE-2020-1609

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on the target device. This ...

8.8CVSS8.7AI score0.00203EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.34 views

CVE-2020-1683

On Juniper Networks Junos OS devices, a specific SNMP OID poll causes a memory leak which over time leads to a kernel crash (vmcore). Prior to the kernel crash other processes might be impacted, such as failure to establish SSH connection to the device. The administrator can monitor the output of t...

7.8CVSS7.5AI score0.00367EPSS
CVE
CVE
added 2021/04/22 8:15 p.m.34 views

CVE-2021-0262

Through routine static code analysis of the Juniper Networks Junos OS software codebase, the Secure Development Life Cycle team identified a Use After Free vulnerability in PFE packet processing on the QFX10002-60C switching platform. Exploitation of this vulnerability may allow a logically adjacen...

6.5CVSS6.5AI score0.00081EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.31 views

CVE-2020-1662

On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit configuration...

7.5CVSS7.6AI score0.00615EPSS
CVE
CVE
added 2020/10/16 9:15 p.m.29 views

CVE-2020-1667

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability, mspm...

8.3CVSS8.3AI score0.00311EPSS
Total number of security vulnerabilities199