Juniper Networks Junos Os vulnerabilities

659 known vulnerabilities affecting juniper_networks/junos_os.

Total CVEs
659
CISA KEV
7
actively exploited
Public exploits
4
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH352MEDIUM273

Vulnerabilities

Page 1 of 33
CVE-2026-33780HIGHCVSS 7.1fixed in 22.4R3-S5≥ 23.2, < 23.2R2-S3+2 more2026-04-09
CVE-2026-33780 [HIGH] CWE-401 CVE-2026-33780: A Missing Release of Memory after Effective Lifetime vulnerability in the Layer 2 Address Learning D A Missing Release of Memory after Effective Lifetime vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a memory leak ultimately leading to a Denial of Service (DoS). In an EVPN-MPLS scenario, routes learned from remote multi-homed Provi
cvelistv5nvd
CVE-2026-33775HIGHCVSS 7.1fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S5+4 more2026-04-09
CVE-2026-33775 [HIGH] CWE-401 CVE-2026-33775: A Missing Release of Memory after Effective Lifetime vulnerability in the BroadBand Edge subscriber A Missing Release of Memory after Effective Lifetime vulnerability in the BroadBand Edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). If the authentication packet-type option is configured and a received packet does not match that pack
cvelistv5nvd
CVE-2026-33793HIGHCVSS 8.5fixed in 22.4R3-S7≥ 23.2, < 23.2R2-S4+3 more2026-04-09
CVE-2026-33793 [HIGH] CWE-250 CVE-2026-33793: An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Network An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system. When a configuration that allows unsigned Python op scripts is present on the device, a non-root user is able to execute mali
cvelistv5nvd
CVE-2026-21919HIGHCVSS 7.1≥ 23.4, < 23.4R2-S4≥ 24.2, < 24.2R2-S1+1 more2026-04-09
CVE-2026-21919 [HIGH] CWE-821 CVE-2026-21919: An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane. When NETCONF sessions are quickly established and disconnected, a locking issue causes mgd processes to hang
cvelistv5nvd
CVE-2026-33778HIGHCVSS 8.7fixed in 22.4R3-S9≥ 23.2, < 23.2R2-S6+4 more2026-04-09
CVE-2026-33778 [HIGH] CWE-1286 CVE-2026-33778: An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of-Service (DoS). If an affected device receives a specifically malformed first ISAKMP packet from the i
cvelistv5nvd
CVE-2026-33781HIGHCVSS 7.1≥ 24.4, < 24.4R2≥ 25.2, < 25.2R1-S1, 25.2R22026-04-09
CVE-2026-33781 [HIGH] CWE-754 CVE-2026-33781: An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engin An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS). On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is ena
cvelistv5nvd
CVE-2026-21916HIGHCVSS 7.0fixed in 23.2R2-S7≥ 23.4, < 23.4R2-S6+3 more2026-04-09
CVE-2026-21916 [HIGH] CWE-61 CVE-2026-21916: A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Networks Junos OS allow A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Networks Junos OS allows a local, authenticated attacker with low privileges to escalate their privileges to root which will lead to a complete compromise of the system. When after a user has performed a specific 'file link ...' CLI operation, another user commits (unrelated
cvelistv5nvd
CVE-2026-33797HIGHCVSS 7.1≥ 25.2, < 25.2R22026-04-09
CVE-2026-33797 [HIGH] CWE-20 CVE-2026-33797: An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service
cvelistv5nvd
CVE-2026-33782HIGHCVSS 8.7fixed in 22.4R3-S1≥ 23.2, < 23.2R2+1 more2026-04-09
CVE-2026-33782 [HIGH] CWE-401 CVE-2026-33782: A Missing Release of Memory after Effective Lifetime vulnerability in the DHCP daemon (jdhcpd) of Ju A Missing Release of Memory after Effective Lifetime vulnerability in the DHCP daemon (jdhcpd) of Juniper Networks Junos OS on MX Series, allows an adjacent, unauthenticated attacker to cause a memory leak, that will eventually cause a complete Denial-of-Service (DoS). In a DHCPv6 over PPPoE, or DHCPv6 over VLAN with Active lease query or Bulk lease
cvelistv5nvd
CVE-2026-33779HIGHCVSS 8.3fixed in 22.4R3-S9≥ 23.2, < 23.2R2-S6+4 more2026-04-09
CVE-2026-33779 [HIGH] CWE-296 CVE-2026-33779: An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks J An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it. When an SRX device is provisioned to connect to Security Director (SD) cloud, it doesn't perform suff
cvelistv5nvd
CVE-2026-33791HIGHCVSS 8.4fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S5+4 more2026-04-09
CVE-2026-33791 [HIGH] CWE-78 CVE-2026-33791: An OS Command Injection vulnerability in the CLI processing of Juniper Networks Junos OS and Junos O An OS Command Injection vulnerability in the CLI processing of Juniper Networks Junos OS and Junos OS Evolved allows a local, high-privileged attacker executing specific, crafted CLI commands to inject arbitrary shell commands as root, leading to a complete compromise of the system. Certain 'set system' commands, when executed with crafted arguments,
cvelistv5nvd
CVE-2026-33790HIGHCVSS 8.7fixed in 21.2R3-S10≥ 21.4, < 21.4R3-S12+10 more2026-04-09
CVE-2026-33790 [HIGH] CWE-754 CVE-2026-33790: An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker sending a specific, malformed ICMPv6 packet to cause the srxpfe process to crash and restart. Continued receipt and processing of these packets will repeatedly crash the srxpfe process and sustai
cvelistv5nvd
CVE-2026-33787MEDIUMCVSS 6.8fixed in 23.2R2-S6≥ 23.4, < 23.4R2-S7+3 more2026-04-09
CVE-2026-33787 [MEDIUM] CWE-754 CVE-2026-33787: An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600 allows a local attacker with low privileges to cause a complete Denial of Service (DoS). When a specific 'show chassis' CLI command is executed, chassisd crashes and rest
cvelistv5nvd
CVE-2026-33773MEDIUMCVSS 6.9≥ 23.4R2-S6, < 23.4R2-S7≥ 24.2R2-S3, < 24.2R2-S42026-04-09
CVE-2026-33773 [MEDIUM] CWE-1419 CVE-2026-33773: An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Junip An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to downstream networks. When the same family inet or inet6 filter is applied on an IRB interface and on a
cvelistv5nvd
CVE-2026-33774MEDIUMCVSS 6.9fixed in 23.2R2-S6≥ 23.4, < 23.4R2-S7+2 more2026-04-09
CVE-2026-33774 [MEDIUM] CWE-754 CVE-2026-33774: An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engin An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and access the control-plane of the device. On MX platforms with MPC10, MPC11, LC4800 or LC9600 line cards,
cvelistv5nvd
CVE-2026-33776MEDIUMCVSS 6.8fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S6+4 more2026-04-09
CVE-2026-33776 [MEDIUM] CWE-862 CVE-2026-33776: A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved a A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a local user with low privileges to read sensitive information. A local user with low privileges can execute the CLI command 'show mgd' with specific arguments which will expose sensitive information. This issue affects Junos OS: * all versio
cvelistv5nvd
CVE-2026-33785MEDIUMCVSS 6.3≥ 24.4, < 24.4R2-S3≥ 25.2, < 25.2R22026-04-09
CVE-2026-33785 [MEDIUM] CWE-862 CVE-2026-33785: A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated user with low privileges to execute specific commands which will lead to a complete compromise of managed devices. Any user logged in, without requiring specific privileges, can issue 'request csds' CLI operational commands. These
cvelistv5nvd
CVE-2026-33786MEDIUMCVSS 6.8≥ 24.4, < 24.4R1-S3, 24.4R22026-04-09
CVE-2026-33786 [MEDIUM] CWE-754 CVE-2026-33786: An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1600, SRX2300 and SRX4300 allows a local attacker with low privileges to cause a complete Denial of Service (DoS). When a specific 'show chassis' CLI command is executed, chassisd crashes and restarts whic
cvelistv5nvd
CVE-2025-30650HIGHCVSS 8.4fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S6+4 more2026-04-08
CVE-2025-30650 [HIGH] CWE-306 CVE-2025-30650: A Missing Authentication for Critical Function vulnerability in command processing of Juniper Networ A Missing Authentication for Critical Function vulnerability in command processing of Juniper Networks Junos OS allows a privileged local attacker to gain access to line cards running Junos OS Evolved as root. This issue affects systems running Junos OS using Linux-based line cards. Affected line cards include: * MPC7, MPC8, MPC9, MPC10, MPC11 * LC2
cvelistv5nvd
CVE-2025-60003HIGHCVSS 8.7fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S5+3 more2026-01-15
CVE-2025-60003 [HIGH] CWE-126 CVE-2025-60003: A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS a A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will
cvelistv5nvd
1 / 33Next →