Juniper Networks Junos Os vulnerabilities

659 known vulnerabilities affecting juniper_networks/junos_os.

Total CVEs
659
CISA KEV
7
actively exploited
Public exploits
6
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH352MEDIUM273

Vulnerabilities

Page 19 of 33
CVE-2021-31350HIGHCVSS 8.8≥ 18.4, < 18.4R1-S8, 18.4R2-S8, 18.4R3-S8≥ 19.1, < 19.1R2-S3, 19.1R3-S5+7 more2021-10-19
CVE-2021-31350 [HIGH] CWE-269 CVE-2021-31350: An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system. The issue is caused by the JET servic
cvelistv5nvd
CVE-2021-31374HIGHCVSS 7.5≥ 17.3, < 17.3R3-S11≥ 17.4, < 17.4R2-S13, 17.4R3-S4+11 more2021-10-19
CVE-2021-31374 [HIGH] CWE-787 CVE-2021-31374: On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this message will create a sustained Denial of Service (DoS) condition. This issue affects both IBGP
cvelistv5nvd
CVE-2021-31359HIGHCVSS 7.8≥ 15.1, < 15.1R7-S10≥ 17.4, < 17.4R3-S5+11 more2021-10-19
CVE-2021-31359 [HIGH] CWE-121 CVE-2021-31359: A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary commands as root. Continued processing of malicious input will repeatedly crash the system and sustain t
cvelistv5nvd
CVE-2021-0299HIGHCVSS 7.5≥ 19.4, < 19.4R3≥ 20.1, < 20.1R2+1 more2021-10-19
CVE-2021-0299 [HIGH] CWE-755 CVE-2021-0299: An Improper Handling of Exceptional Conditions vulnerability in the processing of a transit or direc An Improper Handling of Exceptional Conditions vulnerability in the processing of a transit or directly received malformed IPv6 packet in Juniper Networks Junos OS results in a kernel crash, causing the device to restart, leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS)
cvelistv5nvd
CVE-2021-31368HIGHCVSS 7.5≥ unspecified, < 18.1R3-S13≥ 18.2, < 18.2R3-S8+10 more2021-10-19
CVE-2021-31368 [HIGH] CWE-400 CVE-2021-31368: An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port. Continued receipted of a flood will create a sustained Denial of Service (
cvelistv5nvd
CVE-2021-31363MEDIUMCVSS 6.5≥ 19.2R2, < 19.2*≥ 19.3, < 19.3R2-S6, 19.3R3-S2+4 more2021-10-19
CVE-2021-31363 [MEDIUM] CWE-835 CVE-2021-31363: In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing prot In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps. If a system with sensor-based-stats enabled receives a specific
cvelistv5nvd
CVE-2021-31355MEDIUMCVSS 5.4≥ 12.3X48, < 12.3X48-D105≥ 15.1X49, < 15.1X49-D220+11 more2021-10-19
CVE-2021-31355 [MEDIUM] CWE-79 CVE-2021-31355: A persistent cross-site scripting (XSS) vulnerability in the captive portal graphical user interface A persistent cross-site scripting (XSS) vulnerability in the captive portal graphical user interface of Juniper Networks Junos OS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative act
cvelistv5nvd
CVE-2021-31386MEDIUMCVSS 5.9≥ 12.3, < 12.3R12-S20≥ 15.1, < 15.1R7-S11+12 more2021-10-19
CVE-2021-31386 [MEDIUM] CWE-300 CVE-2021-31386: A Protection Mechanism Failure vulnerability in the J-Web HTTP service of Juniper Networks Junos OS A Protection Mechanism Failure vulnerability in the J-Web HTTP service of Juniper Networks Junos OS allows a remote unauthenticated attacker to perform Person-in-the-Middle (PitM) attacks against the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S20; 15.1 versions prior to 15.1R7-S11; 18.3 versions prior to 18.3
cvelistv5nvd
CVE-2021-31375MEDIUMCVSS 5.3≥ 12.3, < 12.3R12-S18≥ 15.1, < 15.1R7-S9+10 more2021-10-19
CVE-2021-31375 [MEDIUM] CWE-20 CVE-2021-31375: An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI), allows an attacker to send a specific BGP update which may cause RPKI policy-checks to be bypassed. This, in turn, may allow a spoofed advertisement to b
cvelistv5nvd
CVE-2021-31373MEDIUMCVSS 5.4≥ 18.2, < 18.2R3-S8≥ 18.3, < 18.3R3-S5+8 more2021-10-19
CVE-2021-31373 [MEDIUM] CWE-20 CVE-2021-31373: A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J- A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensitive data and credentials from a web administration session, or hijack another user's active sessio
cvelistv5nvd
CVE-2021-31369MEDIUMCVSS 5.3≥ unspecified, < 17.4R3-S5≥ 18.3, < 18.3R3-S5+10 more2021-10-19
CVE-2021-31369 [MEDIUM] CWE-770 CVE-2021-31369: On MX Series platforms with MS-MPC/MS-MIC, an Allocation of Resources Without Limits or Throttling v On MX Series platforms with MS-MPC/MS-MIC, an Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated network attacker to cause a partial Denial of Service (DoS) with a high rate of specific traffic. If a Class of Service (CoS) rule is attached to the service-set and a high rate of sp
cvelistv5nvd
CVE-2021-31370MEDIUMCVSS 6.5≥ unspecified, < 17.3R3-S12≥ 17.4, < 17.4R3-S5+11 more2021-10-19
CVE-2021-31370 [MEDIUM] CWE-184 CVE-2021-31370: An Incomplete List of Disallowed Inputs vulnerability in Packet Forwarding Engine (PFE) of Juniper N An Incomplete List of Disallowed Inputs vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an adjacent unauthenticated attacker which sends a high rate of specific multicast traffic to cause control traffic received from the network to be dropped. This will impact control protocols
cvelistv5nvd
CVE-2021-31371MEDIUMCVSS 5.3≥ unspecified, < 17.3R3-S12≥ 18.1, < 18.1R3-S13+11 more2021-10-19
CVE-2021-31371 [MEDIUM] CWE-200 CVE-2021-31371: Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an QFX5000 Series switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet, leading to an information exposure vulnerability.
cvelistv5nvd
CVE-2021-31367MEDIUMCVSS 6.5≥ unspecified, < 18.4R3-S9≥ 19.1, < 19.1R3-S7+8 more2021-10-19
CVE-2021-31367 [MEDIUM] CWE-401 CVE-2021-31367: A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine ( A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows an adjacent attacker to cause a Denial of Service (DoS) by sending genuine BGP flowspec packets which cause an FPC heap memory leak. Once having run out of memory the FPC will crash and restart al
cvelistv5nvd
CVE-2021-31377MEDIUMCVSS 5.5≥ 15.1, < 15.1R7-S9≥ 17.3, < 17.3R3-S12+13 more2021-10-19
CVE-2021-31377 [MEDIUM] CWE-732 CVE-2021-31377: An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the file An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the filesystem of Junos OS allows a local authenticated attacker to cause routing process daemon (RPD) to crash and restart, causing a Denial of Service (DoS). Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This is
cvelistv5nvd
CVE-2021-31362MEDIUMCVSS 6.5≥ unspecified, < 18.2R3-S8≥ 18.3, < 18.3R3-S5+9 more2021-10-19
CVE-2021-31362 [MEDIUM] CWE-693 CVE-2021-31362: A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Ju A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU leading to a Denial of Service (DoS) condition. Continued receipted of these spoofed PDUs will cre
cvelistv5nvd
CVE-2021-31364MEDIUMCVSS 5.9≥ unspecified, < 17.4R3-S5≥ 18.3, < 18.3R3-S5+9 more2021-10-19
CVE-2021-31364 [MEDIUM] CWE-362 CVE-2021-31364: An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated network based attacker sending specific traffic to cause a crash of the flowd/srxpfe process, res
cvelistv5nvd
CVE-2021-31361MEDIUMCVSS 5.3≥ unspecified, < 17.3R3-S11≥ 17.4, < 17.4R2-S13, 17.4R3-S4+21 more2021-10-19
CVE-2021-31361 [MEDIUM] CWE-754 CVE-2021-31361: An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handlin An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased FPC CPU utilization by sending specific IP packets which are being VXLAN encapsulated leading to
cvelistv5nvd
CVE-2021-31366MEDIUMCVSS 6.5≥ 15.1, < 15.1R7-S9≥ 17.3, < 17.3R3-S12+14 more2021-10-19
CVE-2021-31366 [MEDIUM] CWE-252 CVE-2021-31366: An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Jun An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber management / BBE allows an adjacent attacker to cause a crash by sending a specific username. This impacts authentication, authorization, and accounting (AAA) services on the MX devices and leads to a Denia
cvelistv5nvd
CVE-2021-31365MEDIUMCVSS 6.5≥ unspecified, < 15.1R7-S7≥ 16.1, < 16.1R7-S8+34 more2021-10-19
CVE-2021-31365 [MEDIUM] CWE-400 CVE-2021-31365: An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 an An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 and EX4300 Series platforms allows an adjacent attacker sending a stream of layer 2 frames will trigger an Aggregated Ethernet (AE) interface to go down and thereby causing a Denial of Service (DoS). By continuously sending a stream of specific layer 2
cvelistv5nvd