Juniper Junos Os vulnerabilities

930 known vulnerabilities affecting juniper/junos_os.

Total CVEs
930
CISA KEV
7
actively exploited
Public exploits
9
Exploited in wild
6
Severity breakdown
CRITICAL39HIGH408MEDIUM478LOW5

Vulnerabilities

Page 34 of 47
CVE-2019-0056HIGHCVSS 7.52019-10-09
CVE-2019-0056 [HIGH] CWE-410 CVE-2019-0056: This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OSPF enabled and configured on the device. An Insuff CVE-2019-0056: This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device's Open Shortest Path First (OSPF) states to transition to Down, resulti
juniper
CVE-2019-0061HIGHCVSS 7.82019-10-09
CVE-2019-0061 [HIGH] CWE-657 CVE-2019-0061: The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an in CVE-2019-0061: The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal so
juniper
CVE-2019-0050HIGHCVSS 7.52019-10-09
CVE-2019-0050 [HIGH] CVE-2019-0050: Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service condition for the SRX1500 device. Repeated crashes o CVE-2019-0050: Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service condition for the SRX1500 device. Repeated crashes of the srxpfe can result in an extended denial of service condition. The SRX device may fail to forward traffic when this condition occurs. Affected
juniper
CVE-2019-0060HIGHCVSS 7.52019-10-09
CVE-2019-0060 [HIGH] CWE-755 CVE-2019-0060: The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packe CVE-2019-0060: The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue on
juniper
CVE-2019-0057HIGHCVSS 7.82019-10-09
CVE-2019-0057 [HIGH] CVE-2019-0057: An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access th CVE-2019-0057: An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.
juniper
CVE-2019-0047HIGHCVSS 8.82019-10-09
CVE-2019-0047 [HIGH] CWE-79 CVE-2019-0047: A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative CVE-2019-0047: A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perform certain diagnostic actions on J-Web. Th
juniper
CVE-2019-0055HIGHCVSS 7.52019-10-09
CVE-2019-0055 [HIGH] CWE-130 CVE-2019-0055: A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the dev CVE-2019-0055: A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while pr
juniper
CVE-2019-0064HIGHCVSS 7.52019-10-09
CVE-2019-0064 [HIGH] CVE-2019-0064: On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet CVE-2019-0064: On SRX5000 Series devices, if 'set security zones security-zone tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may res
juniper
CVE-2019-0075HIGHCVSS 7.52019-10-09
CVE-2019-0075 [HIGH] CVE-2019-0075: A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and a CVE-2019-0075: A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an extended denial of service condition. Affected relea
juniper
CVE-2019-0071HIGHCVSS 7.82019-10-09
CVE-2019-0071 [HIGH] CWE-347 CVE-2019-0071: Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specif CVE-2019-0071: Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file i
juniper
CVE-2019-0062HIGHCVSS 7.52019-10-09
CVE-2019-0062 [HIGH] CWE-384 CVE-2019-0062: A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrat CVE-2019-0062: A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior
juniper
CVE-2019-0063MEDIUMCVSS 6.52019-10-09
CVE-2019-0063 [MEDIUM] CVE-2019-0063: When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash whe CVE-2019-0063: When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but contin
juniper
CVE-2019-0074MEDIUMCVSS 5.52019-10-09
CVE-2019-0074 [MEDIUM] CWE-22 CVE-2019-0074: A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine CVE-2019-0074: A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200
juniper
CVE-2019-0054MEDIUMCVSS 6.82019-10-09
CVE-2019-0054 [MEDIUM] CWE-295 CVE-2019-0054: An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS CVE-2019-0054: An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This
juniper
CVE-2019-0069MEDIUMCVSS 5.92019-10-09
CVE-2019-0069 [MEDIUM] CWE-319 CVE-2019-0069: On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, S CVE-2019-0069: On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during
juniper
CVE-2019-0051MEDIUMCVSS 6.52019-10-09
CVE-2019-0051 [MEDIUM] CWE-755 CVE-2019-0051: SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd da CVE-2019-0051: SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients protect
juniper
CVE-2019-0067MEDIUMCVSS 6.52019-10-09
CVE-2019-0067 [MEDIUM] CVE-2019-0067: Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a speciall CVE-2019-0067: Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Network
juniper
CVE-2019-0068MEDIUMCVSS 6.52019-10-09
CVE-2019-0068 [MEDIUM] CWE-754 CVE-2019-0068: The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending th CVE-2019-0068: The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects
juniper
CVE-2019-0073MEDIUMCVSS 6.62019-10-09
CVE-2019-0073 [MEDIUM] CWE-732 CVE-2019-0073: The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow anot CVE-2019-0073: The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15
juniper
CVE-2019-0065MEDIUMCVSS 5.32019-10-09
CVE-2019-0065 [MEDIUM] CVE-2019-0065: On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuous CVE-2019-0065: On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue a
juniper