Juniper Networks Junos Os vulnerabilities

659 known vulnerabilities affecting juniper_networks/junos_os.

Total CVEs
659
CISA KEV
7
actively exploited
Public exploits
6
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH352MEDIUM273

Vulnerabilities

Page 14 of 33
CVE-2023-22391HIGHCVSS 7.5≥ unspecified, < 19.4R3-S9≥ 20.2R1, < 20.2*+4 more2023-01-13
CVE-2023-22391 [HIGH] CWE-755 CVE-2023-22391: A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K Series devices allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). Specific packets are being incorrectly routed to a queue used for other high-priority traffic such as BGP, PIM, ICMP, ICMPV6 ND and ISAKMP. Due to this
cvelistv5nvd
CVE-2023-22409MEDIUMCVSS 5.5≥ unspecified, < 19.4R3-S10≥ 20.1R1, < 20.1*+9 more2023-01-13
CVE-2023-22409 [MEDIUM] CWE-1284 CVE-2023-22409: An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS al An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and
cvelistv5nvd
CVE-2023-22407MEDIUMCVSS 6.5≥ unspecified, < 18.4R2-S7≥ 19.1, < 19.1R3-S2+5 more2023-01-13
CVE-2023-22407 [MEDIUM] CWE-459 CVE-2023-22407: An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos O An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). An rpd crash can occur when an MPLS TE tunnel configuration change occurs on a directly connected router. This issue affects: Juniper Networks Juno
cvelistv5nvd
CVE-2023-22395MEDIUMCVSS 6.5≥ unspecified, < 19.3R3-S7≥ 19.4, < 19.4R3-S9+9 more2023-01-13
CVE-2023-22395 [MEDIUM] CWE-401 CVE-2023-22395: A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). In an MPLS scenario specific packets destined to an Integrated Routing and Bridging (irb) interface of the device will cause a buffer (mbuf) to leak. Continued
cvelistv5nvd
CVE-2023-22398MEDIUMCVSS 5.5≥ 15.1, < 15.1R7-S12≥ 19.1, < 19.1R3-S9+8 more2023-01-13
CVE-2023-22398 [MEDIUM] CWE-824 CVE-2023-22398: An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Net An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). When an MPLS ping is performed on BGP LSPs, the RPD might crash. Repeated execution of this operation will lead to a su
cvelistv5nvd
CVE-2023-22406MEDIUMCVSS 6.5≥ unspecified, < 19.3R3-S7≥ 19.4, < 19.4R2-S8, 19.4R3-S9+8 more2023-01-13
CVE-2023-22406 [MEDIUM] CWE-401 CVE-2023-22406: A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). In a segment-routing scenario with OSPF as IGP, when a peer interface continuously flaps, next-hop churn will happen and a continuous incre
cvelistv5nvd
CVE-2023-22414MEDIUMCVSS 6.5≥ 20.2, < 20.2R3-S6≥ 20.3, < 20.3R3-S6+6 more2023-01-13
CVE-2023-22414 [MEDIUM] CWE-401 CVE-2023-22414: A Missing Release of Memory after Effective Lifetime vulnerability in Flexible PIC Concentrator (FPC A Missing Release of Memory after Effective Lifetime vulnerability in Flexible PIC Concentrator (FPC) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker from the same shared physical or logical network, to cause a heap memory leak and leading to FPC crash. On all Junos PTX Series and QFX10000 Series, when specific EVPN VXLAN M
cvelistv5nvd
CVE-2023-22410MEDIUMCVSS 6.5≥ unspecified, < 20.2R3-S5≥ 20.3R1, < 20.3*2023-01-13
CVE-2023-22410 [MEDIUM] CWE-401 CVE-2023-22410: A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Networks Junos OS A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Networks Junos OS on MX Series platforms with MPC10/MPC11 line cards, allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). Devices are only vulnerable when the Suspicious Control Flow Detection (scfd) feature is enabled. Upon enabling this spe
cvelistv5nvd
CVE-2023-22404MEDIUMCVSS 6.5≥ unspecified, < 19.3R3-S7≥ 19.4, < 19.4R3-S9+8 more2023-01-13
CVE-2023-22404 [MEDIUM] CWE-787 CVE-2023-22404: An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper Networks Junos OS on SRX series and MX with SPC3 allows an authenticated, network-based attacker to cause a Denial of Service (DoS). iked will crash and restart, and the tunnel will not come up when a peer sends a specifically formatted payload during
cvelistv5nvd
CVE-2023-22405MEDIUMCVSS 6.5≥ unspecified, < 20.2R3-S5≥ 20.3, < 20.3R3-S5+6 more2023-01-12
CVE-2023-22405 [MEDIUM] CWE-1250 Junos OS: QFX5k Series, EX46xx Series: MAC limiting feature stops working after PFE restart or device reboot Junos OS: QFX5k Series, EX46xx Series: MAC limiting feature stops working after PFE restart or device reboot An Improper Preservation of Consistency Between Independent Representations of Shared State vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a Denial of Service (
cvelistv5
CVE-2022-22184HIGHCVSS 7.5≥ 22.3, < 22.3R1-S12022-12-22
CVE-2022-22184 [HIGH] CWE-20 CVE-2022-22184: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). If a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, th
cvelistv5nvd
CVE-2022-22241CRITICALCVSS 9.8≥ unspecified, < 19.1R3-S9≥ 19.2, < 19.2R3-S6+11 more2022-10-18
CVE-2022-22241 [CRITICAL] CWE-20 CVE-2022-22241: An Improper Input Validation vulnerability in the J-Web component of Juniper Networks Junos OS may a An Improper Input Validation vulnerability in the J-Web component of Juniper Networks Junos OS may allow an unauthenticated attacker to access data without proper authorization. Utilizing a crafted POST request, deserialization may occur which could lead to unauthorized local file access or the ability to execute arbitrary commands. This issue affe
cvelistv5nvd
CVE-2022-22251HIGHCVSS 7.8≥ 20.2R1, < 20.2*≥ 20.3R1, < 20.3*+2 more2022-10-18
CVE-2022-22251 [HIGH] CWE-257 CVE-2022-22251: On cSRX Series devices software permission issues in the container filesystem and stored files combi On cSRX Series devices software permission issues in the container filesystem and stored files combined with storing passwords in a recoverable format in Juniper Networks Junos OS allows a local, low-privileged attacker to elevate their permissions to take control of any instance of a cSRX software deployment. This issue affects Juniper Networks Junos
cvelistv5nvd
CVE-2022-22235HIGHCVSS 7.5≥ 20.2, < 20.2R3-S5≥ 20.3, < 20.3R3-S4+6 more2022-10-18
CVE-2022-22235 [HIGH] CWE-754 CVE-2022-22235: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engin An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based, attacker to cause Denial of Service (DoS). A PFE crash will happen when a GPRS Tunnel Protocol (GTP) packet is received with a malformed field in the IP header
cvelistv5nvd
CVE-2022-22201HIGHCVSS 7.5≥ unspecified, < 19.4R2-S6, 19.4R3-S7≥ 20.1, < 20.1R3-S3+6 more2022-10-18
CVE-2022-22201 [HIGH] CWE-1285 CVE-2022-22201: An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Packet An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). On SRX5000 Series with SPC3, SRX4000 Series, and vSRX, when PowerMode IPsec is configured and a malformed ESP packe
cvelistv5nvd
CVE-2022-22218HIGHCVSS 7.5≥ unspecified, < 19.1R3-S9≥ 19.2, < 19.2R3-S6+9 more2022-10-18
CVE-2022-22218 [HIGH] CWE-754 CVE-2022-22218: On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificat On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the pkid process. The pkid process cannot handle an unexpected response from the Certificate Auth
cvelistv5nvd
CVE-2022-22231HIGHCVSS 7.5≥ 21.4, < 21.4R1-S2, 21.4R22022-10-18
CVE-2022-22231 [HIGH] CWE-690 CVE-2022-22231: An Unchecked Return Value to NULL Pointer Dereference vulnerability in Packet Forwarding Engine (PFE An Unchecked Return Value to NULL Pointer Dereference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On SRX Series if Unified Threat Management (UTM) Enhanced Content Filtering (CF) and AntiVirus (AV) are enabled together and the system
cvelistv5nvd
CVE-2022-22246HIGHCVSS 8.8≥ unspecified, < 19.1R3-S9≥ 19.2, < 19.2R3-S6+11 more2022-10-18
CVE-2022-22246 [HIGH] CWE-829 CVE-2022-22246: A PHP Local File Inclusion (LFI) vulnerability in the J-Web component of Juniper Networks Junos OS m A PHP Local File Inclusion (LFI) vulnerability in the J-Web component of Juniper Networks Junos OS may allow a low-privileged authenticated attacker to execute an untrusted PHP file. By chaining this vulnerability with other unspecified vulnerabilities, and by circumventing existing attack requirements, successful exploitation could lead to a complete
cvelistv5nvd
CVE-2022-22236HIGHCVSS 7.5≥ 20.4, < 20.4R3-S4≥ 21.1, < 21.1R3-S2+4 more2022-10-18
CVE-2022-22236 [HIGH] CWE-824 CVE-2022-22236: An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper N An Access of Uninitialized Pointer vulnerability in SIP Application Layer Gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When specific valid SIP packets are received the PFE will crash and restart. This issue affects Juniper Networks Junos OS
cvelistv5nvd
CVE-2022-22223HIGHCVSS 7.5≥ unspecified, < 15.1R7-S11≥ 18.4, < 18.4R2-S10, 18.4R3-S10+11 more2022-10-18
CVE-2022-22223 [HIGH] CWE-1285 CVE-2022-22223: On QFX10000 Series devices using Juniper Networks Junos OS when configured as transit IP/MPLS penult On QFX10000 Series devices using Juniper Networks Junos OS when configured as transit IP/MPLS penultimate hop popping (PHP) nodes with link aggregation group (LAG) interfaces, an Improper Validation of Specified Index, Position, or Offset in Input weakness allows an attacker sending certain IP packets to cause multiple interfaces in the LAG to detach
cvelistv5nvd