Lucene search

K

47 matches found

CVE
CVE
added 2018/01/10 10:29 p.m.75 views

CVE-2018-0001

A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prio...

9.8CVSS9.8AI score0.05904EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.61 views

CVE-2018-0016

Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram if 'clns-routing' or ES-IS is explicitly con...

9.8CVSS7.9AI score0.15174EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.59 views

CVE-2018-0007

An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. ...

10CVSS9.7AI score0.00459EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.55 views

CVE-2018-0017

A vulnerability in the Network Address Translation - Protocol Translation (NAT-PT) feature of Junos OS on SRX series devices may allow a certain valid IPv6 packet to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition for the SRX device...

7.5CVSS6.9AI score0.0049EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.55 views

CVE-2018-0021

If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys are at risk to an increased likelihood that ...

8.8CVSS8.8AI score0.00169EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.55 views

CVE-2018-0058

Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of Broadband Edge (BBE) client route processing on MX Series subscriber management platforms, introduced by the Tomcat (Next Gen...

7.8CVSS6.2AI score0.00363EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.54 views

CVE-2018-0004

A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversel...

7.1CVSS6.8AI score0.00288EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.54 views

CVE-2018-0009

On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewall bypass condition...

5.9CVSS6AI score0.00252EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.54 views

CVE-2018-0027

Receipt of a crafted or malformed RSVP PATH message may cause the routing protocol daemon (RPD) to hang or crash. When RPD is unavailable, routing updates cannot be processed which can lead to an extended network outage. If RSVP is not enabled on an interface, then the issue cannot be triggered via...

7.5CVSS6.2AI score0.01181EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.53 views

CVE-2018-0018

On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other internal devices, systems or services protected by ...

7.5CVSS6.6AI score0.00207EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.53 views

CVE-2018-0019

A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt the network monitoring via SNMP, it does not...

5.9CVSS5.9AI score0.00337EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.53 views

CVE-2018-0025

When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-...

8.1CVSS7.1AI score0.00231EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.52 views

CVE-2018-0043

Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. This issue affects ...

8.8CVSS9AI score0.00679EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.51 views

CVE-2018-0022

A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform dependent. The following command provides the number o...

7.8CVSS7.6AI score0.01351EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.50 views

CVE-2018-0002

On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in a...

8.2CVSS6.9AI score0.0184EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.50 views

CVE-2018-0003

A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Junip...

6.5CVSS6.4AI score0.00224EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.50 views

CVE-2018-0008

An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a problem during norm...

7.2CVSS6.9AI score0.00293EPSS
CVE
CVE
added 2018/04/11 7:29 p.m.49 views

CVE-2018-0020

Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. Receipt of a repeated malformed BGP UPDATEs can result in an extended denial of service condition for the device. This malformed BGP UPDATE does not propagate to oth...

7.8CVSS7.5AI score0.00353EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.49 views

CVE-2018-0029

While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affects Junos OS 15.1 and later releases, and affects both single core and multi-core REs. Releases pri...

6.5CVSS6AI score0.00153EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.48 views

CVE-2018-0006

A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caused by attempting to process an unbounded number o...

6.5CVSS6AI score0.00374EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.48 views

CVE-2018-0030

Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. By continuously sending specific MPLS packets, an attacker can repeatedly crash the line cards or PTX1K causing a sustained Denial of Service. Affected releases are Juniper Netw...

7.5CVSS7.5AI score0.00608EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.48 views

CVE-2018-0035

QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended additional Open Network Install Environment (ONIE) partit...

10CVSS7.4AI score0.00115EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.48 views

CVE-2018-0054

On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. The following log message may also...

6.5CVSS6.4AI score0.00186EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.48 views

CVE-2018-0063

A vulnerability in the IP next-hop index database in Junos OS 17.3R3 may allow a flood of ARP requests, sent to the management interface, to exhaust the private Internal routing interfaces (IRIs) next-hop limit. Once the IRI next-hop database is full, no further next hops can be learned and existin...

6.5CVSS6.3AI score0.00116EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.47 views

CVE-2018-0024

An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D45 on SRX Series; 12.3X48 versions pri...

7.8CVSS7.8AI score0.00069EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.47 views

CVE-2018-0048

A vulnerability in the Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support can allow a network based unauthenticated attacker to cause a severe memory exhaustion condition on the device. This can have an adverse impact on the system performance and availability. This issue o...

7.5CVSS7.6AI score0.02348EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.46 views

CVE-2018-0026

After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it doe...

7.5CVSS6AI score0.00927EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.46 views

CVE-2018-0049

A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interfa...

7.5CVSS7.3AI score0.01219EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.46 views

CVE-2018-0050

An error handling vulnerability in Routing Protocols Daemon (RPD) of Juniper Networks Junos OS allows an attacker to cause RPD to crash. Continued receipt of this malformed MPLS RSVP packet will cause a sustained Denial of Service condition. Affected releases are Juniper Networks Junos OS: 14.1 ver...

7.5CVSS5.9AI score0.00748EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.46 views

CVE-2018-0057

On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem sce...

9.6CVSS7.5AI score0.00341EPSS
CVE
CVE
added 2018/08/18 3:29 a.m.46 views

CVE-2018-15504

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.

7.5CVSS7.5AI score0.00416EPSS
CVE
CVE
added 2018/08/18 3:29 a.m.46 views

CVE-2018-15505

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.

7.5CVSS7.5AI score0.00147EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.45 views

CVE-2018-0031

Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. The crafted UDP packets must be encapsulated and meet a very specific packet format to be classified in a way that bypasses IP firewall filter rules. The packets themselves do not cause a servic...

5.9CVSS5.3AI score0.0019EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.45 views

CVE-2018-0034

A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. This issue is limited to systems which receives IPv6 DHCP packets on a system configured for DHCP processing usi...

5.9CVSS5.3AI score0.00605EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.44 views

CVE-2018-0045

Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a ...

8.8CVSS9AI score0.00679EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.44 views

CVE-2018-0053

An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up. Affected releases are Juniper Networks Junos OS: 15.1X49 versions p...

7.2CVSS7AI score0.0005EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.43 views

CVE-2018-0056

If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attempting to delete the duplicate MAC address when the pa...

6.5CVSS5.4AI score0.00167EPSS
CVE
CVE
added 2018/01/10 10:29 p.m.42 views

CVE-2018-0005

QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forward traffic instead of dropping traffic. This can lead to denials of services or other unintended conditions. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D40; 15...

8.8CVSS8.1AI score0.00236EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.42 views

CVE-2018-0037

Junos OS routing protocol daemon (RPD) process may crash and restart or may lead to remote code execution while processing specific BGP NOTIFICATION messages. By continuously sending crafted BGP NOTIFICATION messages, an attacker can repeatedly crash the RPD process causing a sustained Denial of Se...

9.8CVSS9.8AI score0.01815EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0051

A Denial of Service vulnerability in the SIP application layer gateway (ALG) component of Junos OS based platforms allows an attacker to crash MS-PIC, MS-MIC, MS-MPC, MS-DPC or SRX flow daemon (flowd) process. This issue affects Junos OS devices with NAT or stateful firewall configuration in combin...

7.5CVSS6.1AI score0.00406EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0052

If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. There is no documented CLI command to enable this service. However, an undocumented CLI command allow...

9.3CVSS7.6AI score0.08911EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0055

Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. The daemon automatically restarts without intervention, but a continuous receipt of crafted DHCPv6 packets could leaded ...

6.5CVSS5.5AI score0.00241EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0061

A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D81 on SRX Series; 12.3 versions prior to 12.3R12-...

5.3CVSS5.3AI score0.0043EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.41 views

CVE-2018-0062

A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77 on SRX Series; 1...

7.5CVSS6.3AI score0.00488EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.40 views

CVE-2018-0044

An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPasswords option set to "yes". Affected releases are J...

9.8CVSS8.6AI score0.00422EPSS
CVE
CVE
added 2018/10/10 6:29 p.m.40 views

CVE-2018-0060

An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. Junos devices are not v...

5.9CVSS5.5AI score0.002EPSS
CVE
CVE
added 2018/07/11 6:29 p.m.39 views

CVE-2018-0032

The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this adviso...

7.5CVSS7.4AI score0.00536EPSS