Juniper Junos vulnerabilities

749 known vulnerabilities affecting juniper/junos.

Total CVEs
749
CISA KEV
7
actively exploited
Public exploits
13
Exploited in wild
7
Severity breakdown
CRITICAL42HIGH390MEDIUM315LOW2

Vulnerabilities

Page 20 of 38
CVE-2021-0266CRITICALCVSS 9.8v20.2v20.3+1 more2021-04-22
CVE-2021-0266 [CRITICAL] CWE-321 CVE-2021-0266: The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Junos OS on cSRX Series: All versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prio
nvd
CVE-2021-0248CRITICALCVSS 10.0fixed in 19.1v19.12021-04-22
CVE-2021-0248 [CRITICAL] CWE-798 CVE-2021-0248: This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Cr This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Credentials in Juniper Networks Junos OS allows an attacker to take over any instance of an NFX deployment. This issue is only exploitable through administrative interfaces. This issue affects: Juniper Networks Junos OS versions prior to 19.1R1 on NFX S
nvd
CVE-2021-0268CRITICALCVSS 9.3v18.1v18.2+7 more2021-04-22
CVE-2021-0268 [CRITICAL] CWE-79 CVE-2021-0268: An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication. The weakness can be exp
nvd
CVE-2021-0261HIGHCVSS 7.5v12.3v12.3x48+15 more2021-04-22
CVE-2021-0261 [HIGH] CWE-125 CVE-2021-0261: A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Fir A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for these services by sending a high number of specific requests. This issue affects: Juniper Networks
nvd
CVE-2021-0227HIGHCVSS 7.5v17.3v17.4+8 more2021-04-22
CVE-2021-0227 [HIGH] CWE-119 CVE-2021-0227: An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. When thi
nvd
CVE-2021-0244HIGHCVSS 7.4v14.1x53v15.1+11 more2021-04-22
CVE-2021-0244 [HIGH] CWE-362 CVE-2021-0244: A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Net A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which may allow an attacker to bypass the storm-control feature on devices. This issue is a corner case and only occurs during specific actions taken by an admi
nvd
CVE-2021-0250HIGHCVSS 7.5v17.4v18.1+5 more2021-04-22
CVE-2021-0250 [HIGH] CVE-2021-0250: In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) f In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific crafted BGP update message causing the RPD service to core, creating a Denial of Service (DoS) Condition. Continued r
nvd
CVE-2021-0260HIGHCVSS 7.3v17.2v17.3+8 more2021-04-22
CVE-2021-0260 [HIGH] CWE-285 CVE-2021-0260: An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) ser An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) service of Juniper Networks Junos OS leads an unauthenticated attacker being able to perform SNMP read actions, an Exposure of System Data to an Unauthorized Control Sphere, or write actions to OIDs that support write operations, against the device without a
nvd
CVE-2021-0235HIGHCVSS 7.3v18.3v18.4+7 more2021-04-22
CVE-2021-0235 [HIGH] CWE-276 CVE-2021-0235: On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series devices using tena On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series devices using tenant services on Juniper Networks Junos OS, due to incorrect permission scheme assigned to tenant system administrators, a tenant system administrator may inadvertently send their network traffic to one or more tenants while concurrently modifying the overa
nvd
CVE-2021-0246HIGHCVSS 7.3v18.3v18.4+1 more2021-04-22
CVE-2021-0246 [HIGH] CWE-276 CVE-2021-0246: On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, devices using tenant services On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, devices using tenant services on Juniper Networks Junos OS, due to incorrect default permissions assigned to tenant system administrators a tenant system administrator may inadvertently send their network traffic to one or more tenants while concurrently modifying the overall device sy
nvd
CVE-2021-0275HIGHCVSS 8.8v12.3v15.1+15 more2021-04-22
CVE-2021-0275 [HIGH] CWE-79 CVE-2021-0275: A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user session must be active for the attack to succeed. Once successful, the attacker has the same privileges as the user. If the user has root privileges, the attacker m
nvd
CVE-2021-0269HIGHCVSS 8.8v17.4v18.1+9 more2021-04-22
CVE-2021-0269 [HIGH] CWE-233 CVE-2021-0269: The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an atta The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supersede existing parameters, including hardcoded parameters within the HTTP/S session, access and exploit v
nvd
CVE-2021-0230HIGHCVSS 7.5v17.1v17.2+12 more2021-04-22
CVE-2021-0230 [HIGH] CWE-400 CVE-2021-0230: On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operati On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The foll
nvd
CVE-2021-0253HIGHCVSS 7.8v17.2v17.3+9 more2021-04-22
CVE-2021-0253 [HIGH] CWE-77 CVE-2021-0253: NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vuln NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networks Junos OS on NFX Series 17.2 version 17.2R1 and later versions prior to 18.3R3-S4; 18.4 versions pr
nvd
CVE-2021-0252HIGHCVSS 7.8v18.1v18.2+4 more2021-04-22
CVE-2021-0252 [HIGH] CWE-77 CVE-2021-0252: NFX Series devices using Juniper Networks Junos OS are susceptible to a local code execution vulnera NFX Series devices using Juniper Networks Junos OS are susceptible to a local code execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networks Junos OS on NFX Series: 18.1 version 18.1R1 and later versions prior to 18.2R3-S5; 18.3 versions prio
nvd
CVE-2021-0259HIGHCVSS 7.4v17.3v17.4+11 more2021-04-22
CVE-2021-0259 [HIGH] CWE-755 CVE-2021-0259: Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a client device on the overlay network sends a high volume
nvd
CVE-2021-0255HIGHCVSS 7.8v17.3v17.4+12 more2021-04-22
CVE-2021-0255 [HIGH] CWE-250 CVE-2021-0255: A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permissions enabled and is owned by the root user, allowing local users to run ethtraceroute with root pri
nvd
CVE-2021-0251HIGHCVSS 8.6v17.3v17.4+7 more2021-04-22
CVE-2021-0251 [HIGH] CWE-476 CVE-2021-0251: A NULL Pointer Dereference vulnerability in the Captive Portal Content Delivery (CPCD) services daem A NULL Pointer Dereference vulnerability in the Captive Portal Content Delivery (CPCD) services daemon (cpcd) of Juniper Networks Junos OS on MX Series with MS-PIC, MS-SPC3, MS-MIC or MS-MPC allows an attacker to send malformed HTTP packets to the device thereby causing a Denial of Service (DoS), crashing the Multiservices PIC Management Daemon (mspmand
nvd
CVE-2021-0233HIGHCVSS 7.5v17.42021-04-22
CVE-2021-0233 [HIGH] CWE-400 CVE-2021-0233: A vulnerability in Juniper Networks Junos OS ACX500 Series, ACX4000 Series, may allow an attacker to A vulnerability in Juniper Networks Junos OS ACX500 Series, ACX4000 Series, may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a Forwarding Engine Board (FFEB) crash. Continued receipt of these packets will sustain the Denial of Service (DoS) condition. This issue affects Junip
nvd
CVE-2021-0264HIGHCVSS 7.5v19.3v19.4+4 more2021-04-22
CVE-2021-0264 [HIGH] CWE-703 CVE-2021-0264: A vulnerability in the processing of traffic matching a firewall filter containing a syslog action i A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of Service (DoS). Continued receipt and processing of packets matching the fi
nvd