Juniper Junos OS Evolved vulnerabilities

231 known vulnerabilities affecting juniper/junos_os_evolved.

Total CVEs
231
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH132MEDIUM97

Vulnerabilities

Page 5 of 12
CVE-2024-39537MEDIUMCVSS 6.9fixed in 21.4v21.4+5 more2024-07-11
CVE-2024-39537 [MEDIUM] CWE-923 CVE-2024-39537: An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Netw An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network-based attacker to cause a limited information disclosure and availability impact to the device. Due to a wrong initialization, specific processes which should only be able t
nvd
CVE-2024-39553MEDIUMCVSS 6.9v21.4v22.2+3 more2024-07-11
CVE-2024-39553 [MEDIUM] CWE-668 CVE-2024-39553: An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Ju An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited availability impacting Denial of Service (DoS) and allows unauthorized network access to the device,
nvd
CVE-2024-39557HIGHCVSS 7.1fixed in 21.4v21.4+4 more2024-07-10
CVE-2024-39557 [HIGH] CWE-400 CVE-2024-39557: An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS). Certain MAC table updates cause a small amount of m
nvd
CVE-2024-39558HIGHCVSS 7.1fixed in 20.4≥ 21.2, < 21.3+6 more2024-07-10
CVE-2024-39558 [HIGH] CWE-252 CVE-2024-39558: An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Jun An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS), when PIM is configured with Multicast-only Fast Re
nvd
CVE-2024-39555HIGHCVSS 8.7fixed in 21.4v21.4+5 more2024-07-10
CVE-2024-39555 [HIGH] CWE-755 CVE-2024-39555: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued receipt and processing of these malformed BGP update mess
nvd
CVE-2024-39559HIGHCVSS 8.2fixed in 21.2v21.2+5 more2024-07-10
CVE-2024-39559 [HIGH] CWE-754 CVE-2024-39559: An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Junipe An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication enabled, destined to an accessible port on the device, r
nvd
CVE-2024-39562HIGHCVSS 8.7fixed in 21.4v21.4+3 more2024-07-10
CVE-2024-39562 [HIGH] CWE-772 CVE-2024-39562: A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitimate users. Continued receipt of these connections will
nvd
CVE-2024-39512HIGHCVSS 7.0v23.2v23.42024-07-10
CVE-2024-39512 [HIGH] CWE-1263 CVE-2024-39512: An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Ju An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to
nvd
CVE-2024-39556HIGHCVSS 7.1fixed in 21.4v21.4+6 more2024-07-10
CVE-2024-39556 [HIGH] CWE-121 CVE-2024-39556: A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution. By exploiting the 'set security certificates' comma
nvd
CVE-2024-39517HIGHCVSS 7.1fixed in 21.4v21.4+6 more2024-07-10
CVE-2024-39517 [HIGH] CWE-754 CVE-2024-39517: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learnin An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can
nvd
CVE-2024-39560HIGHCVSS 7.1fixed in 21.4v21.4+5 more2024-07-10
CVE-2024-39560 [HIGH] CWE-755 CVE-2024-39560: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS). The kernel memory leak and eventual crash will be
nvd
CVE-2024-39554HIGHCVSS 8.2≥ 21.1, < 21.3v21.4+5 more2024-07-10
CVE-2024-39554 [HIGH] CWE-362 CVE-2024-39554: A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulner A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash an
nvd
CVE-2024-39514HIGHCVSS 7.1fixed in 20.4v20.4+6 more2024-07-10
CVE-2024-39514 [HIGH] CWE-703 CVE-2024-39514: An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker can send specific traffic to the device, which causes the rpd to crash and restart. Continued receipt of
nvd
CVE-2024-39513MEDIUMCVSS 6.8fixed in 20.4v20.4+8 more2024-07-10
CVE-2024-39513 [MEDIUM] CWE-20 CVE-2024-39513: An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS). When a specific "clear" command is run, the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) crashes and restarts. The crash impacts a
nvd
CVE-2024-30380HIGHCVSS 7.1fixed in 21.2v21.2+7 more2024-04-16
CVE-2024-30380 [HIGH] CWE-755 CVE-2024-30380: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP,
nvd
CVE-2024-30382HIGHCVSS 8.7fixed in 21.2v21.2+3 more2024-04-12
CVE-2024-30382 [HIGH] CWE-755 CVE-2024-30382: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS). This issue can only be triggered whe
nvd
CVE-2024-30394HIGHCVSS 8.7fixed in 21.4v21.4+5 more2024-04-12
CVE-2024-30394 [HIGH] CWE-121 CVE-2024-30394: A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when EVPN is configured, and a specific EVPN type-5 route is received vi
nvd
CVE-2024-30395HIGHCVSS 8.7fixed in 21.2v21.2+6 more2024-04-12
CVE-2024-30395 [HIGH] CWE-1287 CVE-2024-30395: An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed
nvd
CVE-2024-21590HIGHCVSS 7.1≤ 21.2v21.2+6 more2024-04-12
CVE-2024-21590 [HIGH] CWE-20 CVE-2024-21590: An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper Networks Junos OS Evolved allows an unauthenticated attacker within the MPLS administrative domain to send specifically crafted packets to the Routing Engine (RE) to cause a Denial of Service (DoS). When specifically crafted transit MPLS IPv4 packets a
nvd
CVE-2024-21598HIGHCVSS 8.7v20.4v21.2+7 more2024-04-12
CVE-2024-21598 [HIGH] CWE-1286 CVE-2024-21598: An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemo An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute
nvd