Juniper Networks Junos Os vulnerabilities
659 known vulnerabilities affecting juniper_networks/junos_os.
Total CVEs
659
CISA KEV
7
actively exploited
Public exploits
6
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH352MEDIUM273
Vulnerabilities
Page 13 of 33
CVE-2023-28984MEDIUMCVSS 5.3≥ unspecified, < 19.4R3-S10≥ 20.2, < 20.2R3-S7+8 more2023-04-17
CVE-2023-28984 [MEDIUM] CWE-362 CVE-2023-28984: A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks J
A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS). The PFE may crash when a lot of MAC learning and aging happens, but due to a Race Condition (Concurrent
cvelistv5nvd
CVE-2023-28980MEDIUMCVSS 5.5≥ 20.2R3-S5, < 20.2R3-S6≥ 20.3R3-S2, < 20.3R3-S5+6 more2023-04-17
CVE-2023-28980 [MEDIUM] CWE-416 CVE-2023-28980: A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scena
cvelistv5nvd
CVE-2023-28975MEDIUMCVSS 4.6≥ unspecified, < 19.4R3-S10≥ 20.2, < 20.2R3-S7+10 more2023-04-17
CVE-2023-28975 [MEDIUM] CWE-394 CVE-2023-28975: An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS a
An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS). When certain USB devices are connected to a USB port of the routing-engine (RE), the kernel will crash leading to a reboot of the device. The devi
cvelistv5nvd
CVE-2023-28979MEDIUMCVSS 4.7≥ unspecified, < 19.3R3-S7≥ 19.4, < 19.4R3-S9+9 more2023-04-17
CVE-2023-28979 [MEDIUM] CWE-754 CVE-2023-28979: An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Netwo
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check. In a 6PE scenario and if an additional integrity check is configured, it will fail to drop specific malformed IPv6 packets, and then these packets will be forwarded
cvelistv5nvd
CVE-2023-1697MEDIUMCVSS 6.5≥ unspecified, < 19.4R3-S10≥ 20.1R1, < 20.1*+9 more2023-04-17
CVE-2023-1697 [MEDIUM] CWE-230 CVE-2023-1697: An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Junipe
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a
cvelistv5nvd
CVE-2023-28961MEDIUMCVSS 5.3≥ unspecified, < 20.2R3-S7≥ 20.4, < 20.4R3-S4+5 more2023-04-17
CVE-2023-28961 [MEDIUM] CWE-241 CVE-2023-28961: An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Jun
An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Juniper Networks Junos OS on the ACX Series devices will prevent a firewall filter with the term 'from next-header ah' from being properly installed in the packet forwarding engine (PFE). There is no immediate indication of an incomplete firewall filter
cvelistv5nvd
CVE-2023-28963MEDIUMCVSS 5.3≥ unspecified, < 19.1R3-S10≥ 19.2, < 19.2R3-S7+13 more2023-04-17
CVE-2023-28963 [MEDIUM] CWE-287 CVE-2023-28963: An Improper Authentication vulnerability in cert-mgmt.php, used by the J-Web component of Juniper Ne
An Improper Authentication vulnerability in cert-mgmt.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to read arbitrary files from temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 vers
cvelistv5nvd
CVE-2023-28959MEDIUMCVSS 6.5≥ unspecified, < 19.1R3-S10≥ 19.4, < 19.4R3-S11+9 more2023-04-17
CVE-2023-28959 [MEDIUM] CWE-703 CVE-2023-28959: An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Junipe
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually restart, resulting in a Denial
cvelistv5nvd
CVE-2023-22413HIGHCVSS 7.5≥ unspecified, < 19.4R3-S9≥ 20.2, < 20.2R3-S5+8 more2023-01-13
CVE-2023-22413 [HIGH] CWE-703 CVE-2023-22413: An Improper Check or Handling of Exceptional Conditions vulnerability in the IPsec library of Junipe
An Improper Check or Handling of Exceptional Conditions vulnerability in the IPsec library of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). On all MX platforms with MS-MPC or MS-MIC card, when specific IPv4 packets are processed by an IPsec6 tunnel, the Multiservices PIC Management Daemon
cvelistv5nvd
CVE-2023-22412HIGHCVSS 7.5≥ 20.4, < 20.4R3-S4≥ 21.1, < 21.1R3-S3+4 more2023-01-13
CVE-2023-22412 [HIGH] CWE-667 CVE-2023-22412: An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-M
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Servic
cvelistv5nvd
CVE-2023-22396HIGHCVSS 7.5≥ 12.3R12-S19, < 12.3*≥ 15.1R7-S10, < 15.1*+17 more2023-01-13
CVE-2023-22396 [HIGH] CWE-400 CVE-2023-22396: An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of J
An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to send crafted TCP packets destined to the device, resulting in an MBUF leak that ultimately leads to a Denial of Service (DoS). The system does not recover automatically and mus
cvelistv5nvd
CVE-2023-22394HIGHCVSS 7.5≥ unspecified, < 19.3R3-S7≥ 19.4, < 19.4R2-S8, 19.4R3-S10+9 more2023-01-13
CVE-2023-22394 [HIGH] CWE-911 CVE-2023-22394: An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper N
An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an attacker to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platforms with MS-MPC or MS-MIC card and all SRX Series platforms where SIP ALG is e
cvelistv5nvd
CVE-2023-22399HIGHCVSS 7.5≥ unspecified, < 19.4R3-S9≥ 20.2, < 20.2R3-S6+8 more2023-01-13
CVE-2023-22399 [HIGH] CWE-120 CVE-2023-22399: When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability
When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) con
cvelistv5nvd
CVE-2023-22415HIGHCVSS 7.5≥ unspecified, < 19.4R3-S10≥ 20.2, < 20.2R3-S6+8 more2023-01-13
CVE-2023-22415 [HIGH] CWE-787 CVE-2023-22415: An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthe
An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all MX Series and SRX Series platform, when H.323 ALG is enabled and specific H.323 packets are received simultaneously, a flow processing daemon (flowd) crash will occur. Continued r
cvelistv5nvd
CVE-2023-22403HIGHCVSS 7.5≥ unspecified, < 20.2R3-S7≥ 20.4, < 20.4R3-S4+5 more2023-01-13
CVE-2023-22403 [HIGH] CWE-770 CVE-2023-22403:
An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engi
An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
On QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the
cvelistv5nvd
CVE-2023-22393HIGHCVSS 7.5≥ 21.1, < 21.1R3-S4≥ 21.2, < 21.2R3-S3+4 more2023-01-13
CVE-2023-22393 [HIGH] CWE-358 CVE-2023-22393: An Improper Check for Unusual or Exceptional Conditions vulnerability in BGP route processing of Jun
An Improper Check for Unusual or Exceptional Conditions vulnerability in BGP route processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to cause Routing Protocol Daemon (RPD) crash by sending a BGP route with invalid next-hop resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create
cvelistv5nvd
CVE-2023-22416HIGHCVSS 7.5≥ 20.4, < 20.4R3-S5≥ 21.1, < 21.1R3-S4+5 more2023-01-13
CVE-2023-22416 [HIGH] CWE-120 CVE-2023-22416: A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unau
A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Netwo
cvelistv5nvd
CVE-2023-22417HIGHCVSS 7.5≥ unspecified, < 19.3R3-S7≥ 19.4, < 19.4R2-S8, 19.4R3-S10+7 more2023-01-13
CVE-2023-22417 [HIGH] CWE-401 CVE-2023-22417: A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (fl
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the flowd process will crash a
cvelistv5nvd
CVE-2023-22411HIGHCVSS 7.5≥ 19.2, < 19.2R3-S6≥ 19.3, < 19.3R3-S6+8 more2023-01-13
CVE-2023-22411 [HIGH] CWE-787 CVE-2023-22411: An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS
An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On SRX Series devices using Unified Policies with IPv6, when a specific IPv6 packet goes through a dynamic-application filter which will generate an ICMP deny message, th
cvelistv5nvd
CVE-2023-22401HIGHCVSS 7.5≥ 22.1R2, < 22.1*≥ 22.2, < 22.2R22023-01-13
CVE-2023-22401 [HIGH] CWE-129 CVE-2023-22401: An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemo
An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On the PTX10008 and PTX10016 platforms running Junos OS or Junos OS Evolved, when a specific SNMP MIB is
cvelistv5nvd