Juniper Mx Series vulnerabilities
114 known vulnerabilities affecting juniper/mx_series.
Total CVEs
114
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH50MEDIUM60
Vulnerabilities
Page 6 of 6
CVE-2019-0065MEDIUMCVSS 5.32019-10-09
CVE-2019-0065 [MEDIUM] CVE-2019-0065: On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuous
CVE-2019-0065: On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue a
juniper
CVE-2019-0007CRITICALCVSS 9.32019-01-15
CVE-2019-0007 [CRITICAL] CWE-330 CVE-2019-0007: The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible
CVE-2019-0007: The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found d
juniper
CVE-2019-0006CRITICALCVSS 9.82019-01-15
CVE-2019-0006 [CRITICAL] CWE-908 CVE-2019-0006: A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on
CVE-2019-0006: A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration. This issue can result in a crash of the fxpc daemon or may potentia
juniper
CVE-2019-0001HIGHCVSS 7.52019-01-15
CVE-2019-0001 [HIGH] CWE-674 CVE-2019-0001: Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge su
CVE-2019-0001: Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. Repeated receipt of the same packet c
juniper
CVE-2018-0058MEDIUMCVSS 5.92018-10-10
CVE-2018-0058 [MEDIUM] CWE-20 CVE-2018-0058: Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot. The issue is specif
CVE-2018-0058: Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of Broadband Edge (BBE) client route processing on MX Series subscriber management platforms, introduced by the Tomcat
juniper
CVE-2018-0056MEDIUMCVSS 6.52018-10-10
CVE-2018-0056 [MEDIUM] CWE-20 CVE-2018-0056: If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between th
CVE-2018-0056: If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attempting to delete the duplicate MAC address w
juniper
CVE-2018-0057MEDIUMCVSS 6.12018-10-10
CVE-2018-0057 [MEDIUM] CVE-2018-0057: On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specifi
CVE-2018-0057: On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem
juniper
CVE-2018-0002HIGHCVSS 8.22018-01-10
CVE-2018-0002 [HIGH] CWE-119 CVE-2018-0002: On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in
CVE-2018-0002: On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which resu
juniper
CVE-2016-4924HIGHCVSS 8.42017-10-13
CVE-2016-4924 [HIGH] CWE-275 CVE-2016-4924: An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or v
CVE-2016-4924: An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. This issue was found during internal produ
juniper
CVE-2017-10611MEDIUMCVSS 6.52017-10-13
CVE-2017-10611 [MEDIUM] CVE-2017-10611: If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including bu
CVE-2017-10611: If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an exte
juniper
CVE-2017-2346MEDIUMCVSS 5.92017-07-17
CVE-2017-2346 [MEDIUM] CVE-2017-2346: An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the
CVE-2017-2346: An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT or stateful-firewall rules are configured wit
juniper
CVE-2017-2340MEDIUMCVSS 5.32017-04-24
CVE-2017-2340 [MEDIUM] CWE-20 CVE-2017-2340: On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHC
CVE-2017-2340: On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 prior to 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX series route
juniper
CVE-2014-6382HIGHCVSS 7.12015-01-16
CVE-2014-6382 [HIGH] CWE-20 CVE-2014-6382: The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2,
CVE-2014-6382: The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a
juniper
CVE-2014-2713MEDIUMCVSS 5.02014-04-14
CVE-2014-2713 [MEDIUM] CVE-2014-2713: Juniper Junos before 11.4R11, 12.1 before 12.1R9, 12.2 before 12.2R7, 12.3R4 before 12.3R4-S3, 13.1 before 13.1R4, 13.2 before 13.2R2, and 13.3 before
CVE-2014-2713: Juniper Junos before 11.4R11, 12.1 before 12.1R9, 12.2 before 12.2R7, 12.3R4 before 12.3R4-S3, 13.1 before 13.1R4, 13.2 before 13.2R2, and 13.3 before 13.3R1, as used in MX Series and T4000 routers, allows remote attackers to cause a denial of service (PFE restart) via a crafted IP packet to cer
juniper
← Previous6 / 6