Juniper Junos OS Evolved vulnerabilities
231 known vulnerabilities affecting juniper/junos_os_evolved.
Total CVEs
231
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH132MEDIUM97
Vulnerabilities
Page 12 of 12
CVE-2020-1648HIGHCVSS 7.5v19.4v20.12020-07-17
CVE-2020-1648 [HIGH] CWE-159 CVE-2020-1648: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affec
nvd
CVE-2020-1644HIGHCVSS 7.5v18.3v19.1+3 more2020-07-17
CVE-2020-1644 [HIGH] CWE-703 CVE-2020-1644: On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE pack
On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBGP multihop deployment in IPv4 or IPv6 network. This issue affects: Juniper
nvd
CVE-2020-1646HIGHCVSS 7.5v19.22020-07-17
CVE-2020-1646 [HIGH] CWE-159 CVE-2020-1646: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when the device is receiving and processing the BGP UPDATE for
nvd
CVE-2020-1632HIGHCVSS 8.6v19.22020-04-15
CVE-2020-1632 [HIGH] CWE-755 CVE-2020-1632: In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Service (DoS) condition. For example, Router A sends a specific BGP UPDATE to
nvd
CVE-2020-1638HIGHCVSS 7.5v19.2v19.3+1 more2020-04-08
CVE-2020-1638 [HIGH] CWE-467 CVE-2020-1638: The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart af
The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plane filtering, will be able to cause the FPC restart. When this issue occurs, all traffic via the FPC will
nvd
CVE-2020-1626HIGHCVSS 7.5v18.32020-04-08
CVE-2020-1626 [HIGH] CVE-2020-1626: A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Serv
A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfeman
nvd
CVE-2020-1620MEDIUMCVSS 5.5fixed in 19.3r12020-04-08
CVE-2020-1620 [MEDIUM] CWE-664 CVE-2020-1620: A local, authenticated user with shell can obtain the hashed values of login passwords via configd s
A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved prior to 19.3R1.
nvd
CVE-2020-1623MEDIUMCVSS 5.5fixed in 19.2r12020-04-08
CVE-2020-1623 [MEDIUM] CWE-532 CVE-2020-1623: A local, authenticated user with shell can view sensitive configuration information via the ev.ops c
A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved prior to 19.2R1.
nvd
CVE-2020-1622MEDIUMCVSS 5.5fixed in 19.1r12020-04-08
CVE-2020-1622 [MEDIUM] CWE-664 CVE-2020-1622: A local, authenticated user with shell can obtain the hashed values of login passwords and shared se
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
nvd
CVE-2020-1621MEDIUMCVSS 5.5fixed in 19.3r12020-04-08
CVE-2020-1621 [MEDIUM] CWE-664 CVE-2020-1621: A local, authenticated user with shell can obtain the hashed values of login passwords via configd t
A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved prior to 19.3R1.
nvd
CVE-2020-1624MEDIUMCVSS 5.5fixed in 19.1r12020-04-08
CVE-2020-1624 [MEDIUM] CWE-532 CVE-2020-1624: A local, authenticated user with shell can obtain the hashed values of login passwords and shared se
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
nvd
← Previous12 / 12