Juniper Junos vulnerabilities

749 known vulnerabilities affecting juniper/junos.

Total CVEs
749
CISA KEV
7
actively exploited
Public exploits
13
Exploited in wild
7
Severity breakdown
CRITICAL42HIGH390MEDIUM315LOW2

Vulnerabilities

Page 17 of 38
CVE-2022-22154MEDIUMCVSS 6.8v16.1v16.1x65+17 more2022-01-19
CVE-2022-22154 [MEDIUM] CWE-642 CVE-2022-22154: In a Junos Fusion scenario an External Control of Critical State Data vulnerability in the Satellite In a Junos Fusion scenario an External Control of Critical State Data vulnerability in the Satellite Device (SD) control state machine of Juniper Networks Junos OS allows an attacker who is able to make physical changes to the cabling of the device to cause a denial of service (DoS). An SD can get rebooted and subsequently controlled by an Aggregati
nvd
CVE-2022-22169MEDIUMCVSS 5.9v15.1v18.3+11 more2022-01-19
CVE-2022-22169 [MEDIUM] CWE-665 CVE-2022-22169: An Improper Initialization vulnerability in the routing protocol daemon (rpd) of Juniper Networks Ju An Improper Initialization vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker who sends specific packets in certain orders and at specific timings to force OSPFv3 to unexpectedly enter graceful-restart (GR helper mode) even though there is not any Grace-LSA received in OSPFv3 causi
nvd
CVE-2022-22172MEDIUMCVSS 6.5v18.4v19.2+8 more2022-01-19
CVE-2022-22172 [MEDIUM] CWE-401 CVE-2022-22172: A Missing Release of Memory after Effective Lifetime vulnerability in the Layer-2 control protocols A Missing Release of Memory after Effective Lifetime vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a memory leak. Continued exploitation can lead to memory exhaustion and thereby a Denial of Service (DoS). This issue occurs when spec
nvd
CVE-2022-22155MEDIUMCVSS 6.5v18.4v19.1+5 more2022-01-19
CVE-2022-22155 [MEDIUM] CWE-400 CVE-2022-22155: An Uncontrolled Resource Consumption vulnerability in the handling of IPv6 neighbor state change eve An Uncontrolled Resource Consumption vulnerability in the handling of IPv6 neighbor state change events in Juniper Networks Junos OS allows an adjacent attacker to cause a memory leak in the Flexible PIC Concentrator (FPC) of an ACX5448 router. The continuous flapping of an IPv6 neighbor with specific timing will cause the FPC to run out of resource
nvd
CVE-2022-22160MEDIUMCVSS 6.5v16.1v16.1x65+26 more2022-01-19
CVE-2022-22160 [MEDIUM] CWE-391 CVE-2022-22160: An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Net An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS). In a subscriber management / broadband edge environment if a single session group configuration contains dual-stack and a pp0 interfa
nvd
CVE-2022-22168MEDIUMCVSS 6.5≤ 19.1v19.2+9 more2022-01-19
CVE-2022-22168 [MEDIUM] CWE-401 CVE-2022-22168: An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Ju An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to trigger a Missing Release of Memory after Effective Lifetime vulnerability. Continued exploitation of this vulnerability will eventually lead to an FPC reboot and thereby a Denial of Service (DoS).
nvd
CVE-2022-22176MEDIUMCVSS 6.5v13.2v13.2x51+31 more2022-01-19
CVE-2022-22176 [MEDIUM] CWE-1286 CVE-2022-22176: An Improper Validation of Syntactic Correctness of Input vulnerability in the Juniper DHCP daemon (j An Improper Validation of Syntactic Correctness of Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker sending a malformed DHCP packet to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If option-82 is configured in a DHCP snooping / -security scenario, jdhc
nvd
CVE-2022-22166MEDIUMCVSS 6.5v20.4v21.12022-01-19
CVE-2022-22166 [MEDIUM] CWE-1284 CVE-2022-22166: An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon ( An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS). If a BGP update message is received over an established BGP session where a BGP SR-TE policy tunnel attribute
nvd
CVE-2022-22163MEDIUMCVSS 6.5fixed in 15.1v15.1+10 more2022-01-19
CVE-2022-22163 [MEDIUM] CWE-20 CVE-2022-22163: An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks J An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If a device is configured as DHCPv6 local server and persistent storage is enabled, jdhcpd will crash when receiving a specific DHCPv6
nvd
CVE-2022-22179MEDIUMCVSS 6.5v17.4v18.1+14 more2022-01-19
CVE-2022-22179 [MEDIUM] CWE-20 CVE-2022-22179: A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). In a scenario where DHCP relay or local server is configured the problem can be triggered if
nvd
CVE-2021-31382CRITICALCVSS 9.0v17.2v17.2x75+20 more2021-10-19
CVE-2021-31382 [CRITICAL] CWE-362 CVE-2021-31382: On PTX1000 System, PTX10002-60C System, after upgrading to an affected release, a Race Condition vul On PTX1000 System, PTX10002-60C System, after upgrading to an affected release, a Race Condition vulnerability between the chassis daemon (chassisd) and firewall process (dfwd) of Juniper Networks Junos OS, may update the device's interfaces with incorrect firewall filters. This issue only occurs when upgrading the device to an affected version of
nvd
CVE-2021-31384CRITICALCVSS 10.0v20.4v21.12021-10-19
CVE-2021-31384 [CRITICAL] CWE-285 CVE-2021-31384: Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management con
nvd
CVE-2021-31372HIGHCVSS 8.8≤ 18.2v18.3+11 more2021-10-19
CVE-2021-31372 [HIGH] CWE-20 CVE-2021-31372: An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally au An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated J-Web attacker to escalate their privileges to root over the target device. This issue affects: Juniper Networks Junos OS All versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior
nvd
CVE-2021-31353HIGHCVSS 7.5v19.3v19.4+4 more2021-10-19
CVE-2021-31353 [HIGH] CWE-755 CVE-2021-31353: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of Service (DoS). Continued receipt and processing of the BGP update will create a sustained Denial of Serv
nvd
CVE-2021-31383HIGHCVSS 7.5v19.2v19.3+4 more2021-10-19
CVE-2021-31383 [HIGH] CWE-121 CVE-2021-31383: In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neig In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a rem
nvd
CVE-2021-31354HIGHCVSS 8.8v19.2v19.3+5 more2021-10-19
CVE-2021-31354 [HIGH] CWE-125 CVE-2021-31354: An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to cause a partial Denial of Service (DoS), or lead to remote code execution (RCE). The vulnerability
nvd
CVE-2021-31351HIGHCVSS 7.5v17.3v17.4+13 more2021-10-19
CVE-2021-31351 [HIGH] CWE-754 CVE-2021-31351: An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC ut An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Servic
nvd
CVE-2021-31385HIGHCVSS 8.8v12.3v15.1+11 more2021-10-19
CVE-2021-31385 [HIGH] CWE-22 CVE-2021-31385: An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in J An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in J-Web of Juniper Networks Junos OS allows any low-privileged authenticated attacker to elevate their privileges to root. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 18.3 versions pri
nvd
CVE-2021-31360HIGHCVSS 7.1v15.1v17.4+11 more2021-10-19
CVE-2021-31360 [HIGH] CWE-20 CVE-2021-31360: An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial of Service (DoS). Depending on the files overwritten, exploitation of this vulnerability could lead to a
nvd
CVE-2021-31350HIGHCVSS 8.8v18.4v19.1+7 more2021-10-19
CVE-2021-31350 [HIGH] CWE-269 CVE-2021-31350: An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system. The issue is caused by the JET servic
nvd
Juniper Junos vulnerabilities | cvebase