Juniper Junos OS Evolved vulnerabilities

231 known vulnerabilities affecting juniper/junos_os_evolved.

Total CVEs
231
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH132MEDIUM97

Vulnerabilities

Page 7 of 12
CVE-2023-44204MEDIUMCVSS 6.5v21.4v22.1+4 more2023-10-13
CVE-2023-44204 [MEDIUM] CWE-1286 CVE-2023-44204: An Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon ( An Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, the rpd crashes and restarts. T
nvd
CVE-2023-44196MEDIUMCVSS 6.5fixed in 20.4v20.4+8 more2023-10-13
CVE-2023-44196 [MEDIUM] CVE-2023-44196: An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Ju An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system. When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. Thi
nvd
CVE-2023-44184MEDIUMCVSS 6.5fixed in 21.4v21.4+4 more2023-10-13
CVE-2023-44184 [MEDIUM] CWE-119 CVE-2023-44184: An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the man An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device's control plane. T
nvd
CVE-2023-44201MEDIUMCVSS 5.5fixed in 20.4v20.4+4 more2023-10-13
CVE-2023-44201 [MEDIUM] CWE-732 CVE-2023-44201: An Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Junipe An Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Juniper Networks Junos OS and Junos OS Evolved allows a local authenticated attacker to read configuration changes without having the permissions. When a user with the respective permissions commits a configuration change, a specific file is created. That f
nvd
CVE-2023-44176MEDIUMCVSS 5.5fixed in 20.4v20.4+7 more2023-10-13
CVE-2023-44176 [MEDIUM] CWE-121 CVE-2023-44176: A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions pri
nvd
CVE-2023-44178MEDIUMCVSS 5.5fixed in 20.4v20.4+7 more2023-10-13
CVE-2023-44178 [MEDIUM] CWE-121 CVE-2023-44178: A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS * All versions prio
nvd
CVE-2023-44195MEDIUMCVSS 5.3v21.4v22.1+5 more2023-10-13
CVE-2023-44195 [MEDIUM] CWE-923 CVE-2023-44195: An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Network An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system. If specific packets reach the Routing-Engine (RE) these will be processed no
nvd
CVE-2023-44175HIGHCVSS 7.5v22.3v22.4+1 more2023-10-12
CVE-2023-44175 [HIGH] CWE-617 CVE-2023-44175: A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Not
nvd
CVE-2023-36839MEDIUMCVSS 6.5fixed in 20.4v20.4+8 more2023-10-12
CVE-2023-36839 [MEDIUM] CWE-1284 CVE-2023-36839: An Improper Validation of Specified Quantity in Input vulnerability in the Layer-2 control protocol An Improper Validation of Specified Quantity in Input vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker who sends specific LLDP packets to cause a Denial of Service(DoS). This issue occurs when specific LLDP packets are received and telemetry
nvd
CVE-2023-44186HIGHCVSS 7.5fixed in 20.4v20.4+9 more2023-10-11
CVE-2023-44186 [HIGH] CWE-755 CVE-2023-44186: An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Netwo An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustaine
nvd
CVE-2023-44190MEDIUMCVSS 5.4fixed in 21.4v21.4+5 more2023-10-11
CVE-2023-44190 [MEDIUM] CWE-346 CVE-2023-44190: An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved o An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the rout
nvd
CVE-2023-44187MEDIUMCVSS 5.5fixed in 20.4v20.4+6 more2023-10-11
CVE-2023-44187 [MEDIUM] CWE-200 CVE-2023-44187: An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved al An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system. This issue affects Juniper Networks Junos OS Evolved: *
nvd
CVE-2023-44189MEDIUMCVSS 5.4fixed in 21.4v21.4+5 more2023-10-11
CVE-2023-44189 [MEDIUM] CWE-346 CVE-2023-44189: An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved o An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if
nvd
CVE-2023-4481HIGHCVSS 7.5fixed in 20.4v20.4+8 more2023-09-01
CVE-2023-4481 [HIGH] CWE-20 CVE-2023-4481: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPD
nvd
CVE-2023-36849MEDIUMCVSS 6.5v21.4v22.1+2 more2023-07-14
CVE-2023-36849 [MEDIUM] CWE-703 CVE-2023-36849: An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protoco An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). When a malformed LLDP packet is received, l2cpd will crash and restart. The impact of the l2cpd crash
nvd
CVE-2023-36840MEDIUMCVSS 5.5fixed in 20.4v20.4+7 more2023-07-14
CVE-2023-36840 [MEDIUM] CWE-617 CVE-2023-36840: A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS an A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. Continued execution of this specific comman
nvd
CVE-2023-36836MEDIUMCVSS 4.7fixed in 20.4v20.4+6 more2023-07-14
CVE-2023-36836 [MEDIUM] CWE-908 CVE-2023-36836: A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Net A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can
nvd
CVE-2023-36833MEDIUMCVSS 6.5v21.2v21.3+5 more2023-07-14
CVE-2023-36833 [MEDIUM] CWE-416 CVE-2023-36833: A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Ev A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). The process 'aftman-bt' will crash after multiple flaps on a multicast-only fast reroute (MoFRR
nvd
CVE-2023-0026HIGHCVSS 7.5fixed in 20.4v20.4+9 more2023-06-21
CVE-2023-0026 [HIGH] CWE-20 CVE-2023-0026: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, t
nvd
CVE-2023-28982HIGHCVSS 7.5v20.3v20.4+2 more2023-04-17
CVE-2023-28982 [HIGH] CWE-401 CVE-2023-28982: A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an attribute of an active BGP route is updated memory will leak. As rpd memory usa
nvd