Lucene search

K

11 matches found

CVE
CVE
added 2018/07/11 6:29 p.m.54 views

CVE-2018-0027

Receipt of a crafted or malformed RSVP PATH message may cause the routing protocol daemon (RPD) to hang or crash. When RPD is unavailable, routing updates cannot be processed which can lead to an extended network outage. If RSVP is not enabled on an interface, then the issue cannot be triggered via...

7.5CVSS6.2AI score0.01029EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.53 views

CVE-2018-0025

When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-...

8.1CVSS7.1AI score0.00231EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.49 views

CVE-2018-0029

While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affects Junos OS 15.1 and later releases, and affects both single core and multi-core REs. Releases pri...

6.5CVSS6AI score0.00153EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.48 views

CVE-2018-0030

Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. By continuously sending specific MPLS packets, an attacker can repeatedly crash the line cards or PTX1K causing a sustained Denial of Service. Affected releases are Juniper Netw...

7.5CVSS7.5AI score0.00608EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.48 views

CVE-2018-0035

QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended additional Open Network Install Environment (ONIE) partit...

10CVSS7.4AI score0.00115EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.47 views

CVE-2018-0024

An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D45 on SRX Series; 12.3X48 versions pri...

7.8CVSS7.8AI score0.0006EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.46 views

CVE-2018-0026

After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it doe...

7.5CVSS6AI score0.00808EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.45 views

CVE-2018-0031

Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. The crafted UDP packets must be encapsulated and meet a very specific packet format to be classified in a way that bypasses IP firewall filter rules. The packets themselves do not cause a servic...

5.9CVSS5.3AI score0.0019EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.45 views

CVE-2018-0034

A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. This issue is limited to systems which receives IPv6 DHCP packets on a system configured for DHCP processing usi...

5.9CVSS5.3AI score0.00605EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.42 views

CVE-2018-0037

Junos OS routing protocol daemon (RPD) process may crash and restart or may lead to remote code execution while processing specific BGP NOTIFICATION messages. By continuously sending crafted BGP NOTIFICATION messages, an attacker can repeatedly crash the RPD process causing a sustained Denial of Se...

9.8CVSS9.8AI score0.01815EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.39 views

CVE-2018-0032

The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this adviso...

7.5CVSS7.4AI score0.00536EPSS