Juniper Junos vulnerabilities

749 known vulnerabilities affecting juniper/junos.

Total CVEs
749
CISA KEV
7
actively exploited
Public exploits
13
Exploited in wild
7
Severity breakdown
CRITICAL42HIGH390MEDIUM315LOW2

Vulnerabilities

Page 33 of 38
CVE-2017-2348HIGHCVSS 7.5v14.1x53v15.1+2 more2017-07-17
CVE-2017-2348 [HIGH] CWE-400 CVE-2017-2348: The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon re The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other Juniper Networks products or platforms are affected by this issue. Affected
nvd
CVE-2017-2344HIGHCVSS 7.8v12.1x46v12.3x48+13 more2017-07-17
CVE-2017-2344 [HIGH] CWE-119 CVE-2017-2344: A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious exploitation of this issue may lead to a denial of service (kernel panic) or be leveraged as a privilege escalation through local code execution. The routines are only accessible via programs running on the device itself, and veriexec restricts arbitrary p
nvd
CVE-2017-10602HIGHCVSS 7.8v14.1x53v14.2+7 more2017-07-17
CVE-2017-10602 [HIGH] CWE-119 CVE-2017-10602: A buffer overflow vulnerability in Junos OS CLI may allow a local authenticated user with read only A buffer overflow vulnerability in Junos OS CLI may allow a local authenticated user with read only privileges and access to Junos CLI, to execute code with root privileges. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D46 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE),
nvd
CVE-2017-10603HIGHCVSS 7.8v15.1x53v15.12017-07-17
CVE-2017-10603 [HIGH] CWE-91 CVE-2017-10603: An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate pri An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 prior to 15.1X53-D47, 15.1 prior to 15.1R3. Junos versions prior to 15.1 are not a
nvd
CVE-2017-2342HIGHCVSS 8.1v15.1x492017-07-17
CVE-2017-2342 [HIGH] CWE-392 CVE-2017-2342: MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that are not capable of MACsec or when a secure link can not be established. This can mislead customers into b
nvd
CVE-2017-2341HIGHCVSS 8.8v14.1x53v14.1x53-d10+9 more2017-07-17
CVE-2017-2341 [HIGH] CWE-287 CVE-2017-2341: An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virt An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privileges. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D40 on QFX5110, QFX5200, QF
nvd
CVE-2017-2314HIGHCVSS 7.5v12.3v12.3x48+8 more2017-07-17
CVE-2017-2314 [HIGH] CWE-20 CVE-2017-2314: Receipt of a malformed BGP OPEN message may cause the routing protocol daemon (rpd) process to crash Receipt of a malformed BGP OPEN message may cause the routing protocol daemon (rpd) process to crash and restart. By continuously sending specially crafted BGP OPEN messages, an attacker can repeatedly crash the rpd process causing prolonged denial of service. No other Juniper Networks products or platforms are affected by this issue. Affected releases a
nvd
CVE-2017-2347HIGHCVSS 7.5v12.3x48v13.3+7 more2017-07-17
CVE-2017-2347 [HIGH] CWE-20 CVE-2017-2347: A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affected releases are Junos OS 12.3X48 prior to 12.3X48-D50, 12.3X48-D55; 13.3 prio
nvd
CVE-2017-2349HIGHCVSS 8.8v12.1x44v12.1x46+3 more2017-07-17
CVE-2017-2349 [HIGH] CWE-77 CVE-2017-2349: A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devi A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 prior to 12.1X44-D60; 12.1X46 prior to 12.1X46-D50; 12.1X47 prior to 12.1X47-D30, 12.1X4
nvd
CVE-2017-2346MEDIUMCVSS 5.9v14.1x55v14.2+2 more2017-07-17
CVE-2017-2346 [MEDIUM] CVE-2017-2346: An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Applic An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured with ALGs enabled. This issue was caused by the code change for PR 1
nvd
CVE-2017-10604MEDIUMCVSS 5.3v12.1x46v12.3x48+1 more2017-07-17
CVE-2017-10604 [MEDIUM] CWE-307 CVE-2017-10604: When the device is configured to perform account lockout with a defined period of time, any unauthen When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with sy
nvd
CVE-2017-2302HIGHCVSS 7.5v12.1x46v12.1x47+8 more2017-05-30
CVE-2017-2302 [HIGH] CVE-2017-2302: On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D55, 12.1X47 pri On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D55, 12.1X47 prior to 12.1X47-D45, 12.3R13 prior to 12.3R13, 12.3X48 prior to 12.3X48-D35, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R6, 15.1 prior to 15.1F2 or 15.1R1, 15.1X49 prior to 15.1X49-D20
nvd
CVE-2017-2304HIGHCVSS 7.5v14.1x53v15.1+1 more2017-05-30
CVE-2017-2304 [HIGH] CWE-200 CVE-2017-2304: Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1 Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak'
nvd
CVE-2017-2300HIGHCVSS 7.5≤ 12.1x46≤ 12.3x482017-05-30
CVE-2017-2300 [HIGH] CVE-2017-2300: On Juniper Networks SRX Series Services Gateways chassis clusters running Junos OS 12.1X46 prior to On Juniper Networks SRX Series Services Gateways chassis clusters running Junos OS 12.1X46 prior to 12.1X46-D65, 12.3X48 prior to 12.3X48-D40, 12.3X48 prior to 12.3X48-D60, flowd daemon on the primary node of an SRX Series chassis cluster may crash and restart when attempting to synchronize a multicast session created via crafted multicast packets.
nvd
CVE-2017-2301HIGHCVSS 7.5v11.4v12.1x46+11 more2017-05-30
CVE-2017-2301 [HIGH] CVE-2017-2301: On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior t On Juniper Networks products or platforms running Junos OS 11.4 prior to 11.4R13-S3, 12.1X46 prior to 12.1X46-D60, 12.3 prior to 12.3R12-S2 or 12.3R13, 12.3X48 prior to 12.3X48-D40, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D12 or 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R7, 15.1 prio
nvd
CVE-2017-2303HIGHCVSS 7.5v12.1x46v12.1x47+11 more2017-05-30
CVE-2017-2303 [HIGH] CVE-2017-2303: On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D50, 12.1X47 pri On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D40, 12.3 prior to 12.3R13, 12.3X48 prior to 12.3X48-D30, 13.2X51 prior to 13.2X51-D40, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D35, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R5, 15.1 prior to 15.1F6 or 15.1R3, 15
nvd
CVE-2017-2315HIGHCVSS 7.5v12.3v13.3+8 more2017-04-24
CVE-2017-2315 [HIGH] CWE-772 CVE-2017-2315: On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may
nvd
CVE-2017-2313HIGHCVSS 7.5v15.1v15.1x49+3 more2017-04-24
CVE-2017-2313 [HIGH] CWE-20 CVE-2017-2313: Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a craf Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS versions are: 15.1 prior to 15.1F2-S15, 15.1F5-S7, 15.1F6-S5
nvd
CVE-2017-2312MEDIUMCVSS 6.5v13.3v14.1+5 more2017-04-24
CVE-2017-2312 [MEDIUM] CWE-772 CVE-2017-2312: On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP packet destined to the RE (Routing Engine) will consume a small amount of the memory allocated for the rpd (routing protocol daemon) process. Over time, repeatedly receiving this type of LDP packet(s) will cause the memory to exhaust and the rpd process
nvd
CVE-2017-2340MEDIUMCVSS 5.3v15.1v16.12017-04-24
CVE-2017-2340 [MEDIUM] CWE-20 CVE-2017-2340: On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX plat On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX series routers can result in a PFE (Packet Forwarding Engine) hang or crash.
nvd