Juniper Junos Os vulnerabilities
930 known vulnerabilities affecting juniper/junos_os.
Total CVEs
930
CISA KEV
7
actively exploited
Public exploits
9
Exploited in wild
6
Severity breakdown
CRITICAL39HIGH408MEDIUM478LOW5
Vulnerabilities
Page 14 of 47
CVE-2024-21594MEDIUMCVSS 5.52024-01-12
CVE-2024-21594 [MEDIUM] CWE-122 CVE-2024-21594:
A Heap-based Buffer Overflow vulnerability in the Network Services Daemon (NSD) of Juniper Networks Junos OS allows authenticated, low privileged, lo
CVE-2024-21594:
A Heap-based Buffer Overflow vulnerability in the Network Services Daemon (NSD) of Juniper Networks Junos OS allows authenticated, low privileged, local attacker to cause a Denial of Service (DoS).
On an SRX 5000 Series device, when executing a specific command repeatedly, memory is
juniper
CVE-2024-21585MEDIUMCVSS 5.92024-01-12
CVE-2024-21585 [MEDIUM] CWE-755 CVE-2024-21585:
An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an un
CVE-2024-21585:
An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing p
juniper
CVE-2024-21597MEDIUMCVSS 5.32024-01-12
CVE-2024-21597 [MEDIUM] CWE-668 CVE-2024-21597:
An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an unaut
CVE-2024-21597:
An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the intended access restrictions.
In an Abstracted Fabric (AF) scenario if routing-instanc
juniper
CVE-2024-21596MEDIUMCVSS 5.32024-01-12
CVE-2024-21596 [MEDIUM] CWE-122 CVE-2024-21596:
A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthent
CVE-2024-21596:
A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
If an attacker sends a specific BGP UPDATE message to the device, th
juniper
CVE-2024-21587MEDIUMCVSS 6.52024-01-12
CVE-2024-21587 [MEDIUM] CWE-755 CVE-2024-21587:
An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos
CVE-2024-21587:
An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an attacker directly connected to the vulnerable system who repeatedly flaps DHCP subscriber sessions to cause a s
juniper
CVE-2024-21601MEDIUMCVSS 5.92024-01-12
CVE-2024-21601 [MEDIUM] CWE-362 CVE-2024-21601:
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in the Flow-processing Daemon (flowd) of
CVE-2024-21601:
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in the Flow-processing Daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos).
On SRX Ser
juniper
CVE-2023-36842MEDIUMCVSS 6.52024-01-12
CVE-2023-36842 [MEDIUM] CWE-703 CVE-2023-36842:
An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent
CVE-2023-36842:
An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause the jdhcpd to consume all the CPU cycles resulting in a Denial of Service (DoS).
On Junos OS device
juniper
CVE-2024-21613MEDIUMCVSS 6.52024-01-12
CVE-2024-21613 [MEDIUM] CWE-401 CVE-2024-21613:
A Missing Release of Memory after Effective Lifetime vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved
CVE-2024-21613:
A Missing Release of Memory after Effective Lifetime vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause an rpd crash, leading to Denial of Service (DoS).
On all Junos OS and Junos OS E
juniper
CVE-2023-44182HIGHCVSS 7.32023-10-13
CVE-2023-44182 [HIGH] CWE-252 CVE-2023-44182:
An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML M
CVE-2023-44182:
An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfaces causes unintended effects such as
juniper
CVE-2023-44199HIGHCVSS 7.52023-10-13
CVE-2023-44199 [HIGH] CWE-754 CVE-2023-44199:
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series
CVE-2023-44199:
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
On Junos MX Series platforms with Precision Time Pr
juniper
CVE-2023-44197HIGHCVSS 7.52023-10-13
CVE-2023-44197 [HIGH] CWE-787 CVE-2023-44197:
An Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated
CVE-2023-44197:
An Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
On all Junos OS and Junos OS Evolved devices an rpd crash and restart can oc
juniper
CVE-2023-44191HIGHCVSS 7.52023-10-13
CVE-2023-44191 [HIGH] CWE-770 CVE-2023-44191:
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker
CVE-2023-44191:
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).
On all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured,
juniper
CVE-2023-44185HIGHCVSS 7.52023-10-13
CVE-2023-44185 [HIGH] CWE-20 CVE-2023-44185:
An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (
CVE-2023-44185:
An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet.
Continued receipt of this packet will cau
juniper
CVE-2023-44192HIGHCVSS 7.52023-10-13
CVE-2023-44192 [HIGH] CWE-20 CVE-2023-44192:
An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based atta
CVE-2023-44192:
An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause memory leak, leading to Denial of Service (DoS).
On all Junos OS QFX5000 Series platforms, when pseudo-VTEP (Virtual Tunnel
juniper
CVE-2023-44181HIGHCVSS 7.52023-10-13
CVE-2023-44181 [HIGH] CWE-835 CVE-2023-44181:
An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be
CVE-2023-44181:
An Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog.
This issue is triggered when Storm control is enable
juniper
CVE-2023-44194HIGHCVSS 8.42023-10-13
CVE-2023-44194 [HIGH] CWE-276 CVE-2023-44194:
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to cre
CVE-2023-44194:
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to create a backdoor with root privileges. The issue is caused by improper directory permissions on a certain system directory, allowing an atta
juniper
CVE-2023-44177MEDIUMCVSS 5.52023-10-13
CVE-2023-44177 [MEDIUM] CWE-121 CVE-2023-44177:
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a
CVE-2023-44177:
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.
Repeated actions by the attacker will create a sustained Denial of Service (DoS) con
juniper
CVE-2023-44204MEDIUMCVSS 6.52023-10-13
CVE-2023-44204 [MEDIUM] CWE-1286 CVE-2023-44204:
An Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon (rpd) Juniper Networks Junos OS and Junos OS Evolve
CVE-2023-44204:
An Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
When a malformed BGP UPDATE packet is received
juniper
CVE-2023-44178MEDIUMCVSS 5.52023-10-13
CVE-2023-44178 [MEDIUM] CWE-121 CVE-2023-44178:
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CL
CVE-2023-44178:
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.
Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition.
T
juniper
CVE-2023-44203MEDIUMCVSS 6.52023-10-13
CVE-2023-44203 [MEDIUM] CWE-703 CVE-2023-44203:
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 S
CVE-2023-44203:
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600 allows a adjacent attacker to send specific traffic, which leads to packet flooding, re
juniper