Juniper Networks Junos Os vulnerabilities
659 known vulnerabilities affecting juniper_networks/junos_os.
Total CVEs
659
CISA KEV
7
actively exploited
Public exploits
6
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH352MEDIUM273
Vulnerabilities
Page 20 of 33
CVE-2021-0284HIGHCVSS 7.5≥ 12.3, < 12.3R12-S19≥ 15.1, < 15.1R7-S10+12 more2021-08-17
CVE-2021-0284 [HIGH] CWE-120 CVE-2021-0284: A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut do
cvelistv5nvd
CVE-2021-0278HIGHCVSS 7.8≥ 19.3R1, < 19.3*≥ 19.4, < 19.4R3-S5+5 more2021-07-15
CVE-2021-0278 [HIGH] CWE-20 CVE-2021-0278: An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally au
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated attacker to escalate their privileges to root over the target device. junos:18.3R3-S5 junos:18.4R3-S9 junos:19.1R3-S6 junos:19.3R2-S6 junos:19.3R3-S3 junos:19.4R1-S4 junos:19.4R3-S4 junos:20.1R2-S2 junos:20.1R3 junos:20.2R3-S1 junos:20.3X75-D20
cvelistv5nvd
CVE-2021-0277HIGHCVSS 8.8≥ 12.3, < 12.3R12-S18≥ 15.1, < 15.1R7-S9+14 more2021-07-15
CVE-2021-0277 [HIGH] CWE-125 CVE-2021-0277: An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer
An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS), or may lead to remote code execution (RCE). Continued receipt and processing of these frames, sent from the local
cvelistv5nvd
CVE-2021-0282HIGHCVSS 7.5≥ 12.3, < 12.3R12-S18≥ 15.1, < 15.1R7-S9+7 more2021-07-15
CVE-2021-0282 [HIGH] CWE-754 CVE-2021-0282: On Juniper Networks Junos OS devices with Multipath or add-path feature enabled, processing a specif
On Juniper Networks Junos OS devices with Multipath or add-path feature enabled, processing a specific BGP UPDATE can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this UPDATE message will create a sustained Denial of Service (DoS) condition. This BGP UPDATE message can p
cvelistv5nvd
CVE-2021-0285HIGHCVSS 7.5≥ 15.1, < 15.1R7-S9≥ 17.3, < 17.3R3-S11+11 more2021-07-15
CVE-2021-0285 [HIGH] CWE-770 CVE-2021-0285: An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series an
An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP) interruptions, leading to an unstable control connection between the Multi-Chassis Link Aggregatio
cvelistv5nvd
CVE-2021-0280HIGHCVSS 7.5≥ 17.4, < 17.4R3-S5≥ 18.2, < 18.2R3-S8+10 more2021-07-15
CVE-2021-0280 [HIGH] CWE-665 CVE-2021-0280: Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QF
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QFX10K Series with Paradise (PE) chipset-based line cards, ddos-protection configuration changes made from the CLI will not take effect as expected beyond the default DDoS (Distributed Denial of Service) settings in the Packet Forwarding Engine (PFE). This
cvelistv5nvd
CVE-2021-0283HIGHCVSS 7.5≥ 12.3, < 12.3R12-S19≥ 15.1, < 15.1R7-S10+20 more2021-07-15
CVE-2021-0283 [HIGH] CWE-120 CVE-2021-0283: A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut do
cvelistv5nvd
CVE-2021-0281HIGHCVSS 7.5≥ 17.3, < 17.3R3-S12≥ 17.4, < 17.4R3-S5+12 more2021-07-15
CVE-2021-0281 [HIGH] CWE-754 CVE-2021-0281: On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key
On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustain
cvelistv5nvd
CVE-2021-0291MEDIUMCVSS 6.5≥ 15.1, < 15.1R7-S9≥ 17.3, < 17.3R3-S12+10 more2021-07-15
CVE-2021-0291 [MEDIUM] CWE-497 CVE-2021-0291: An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource. A high rate of specific traffic may lead to a partial Denial of Service (
cvelistv5nvd
CVE-2021-0295MEDIUMCVSS 6.1≥ 17.3, < 17.3R3-S12≥ 17.4, < 17.4R3-S5+12 more2021-07-15
CVE-2021-0295 [MEDIUM] CWE-697 CVE-2021-0295: A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) of Juniper Networks Junos
A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) of Juniper Networks Junos OS on the QFX10K Series switches allows an attacker to trigger a packet forwarding loop, leading to a partial Denial of Service (DoS). The issue is caused by DVMRP packets looping on a multi-homed Ethernet Segment Identifier (ESI) when VXLAN is configure
cvelistv5nvd
CVE-2021-0287MEDIUMCVSS 6.5≥ 19.4R1, < 19.4*≥ 20.1, < 20.1R2-S1, 20.1R3+2 more2021-07-15
CVE-2021-0287 [MEDIUM] CWE-754 CVE-2021-0287: In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evol
In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued link f
cvelistv5nvd
CVE-2021-0288MEDIUMCVSS 6.5≥ 17.3, < 17.3R3-S12≥ 17.4, < 17.4R2-S13, 17.4R3-S5+12 more2021-07-15
CVE-2021-0288 [MEDIUM] CWE-754 CVE-2021-0288: A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash and lead to a Denial of Service (DoS) condition. Continued receipt of this packet will sustain the Denial of Service (DoS) condition. This issue only aff
cvelistv5nvd
CVE-2021-0290MEDIUMCVSS 6.5≥ 16.1, < 16.1R7-S7≥ 17.1R1, < 17.1*+10 more2021-07-15
CVE-2021-0290 [MEDIUM] CWE-755 CVE-2021-0290: Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networ
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, causing the interface to go into a down state, resulting in a Denial of Service (DoS) condition. The interface does not recover on its own and the FPC must
cvelistv5nvd
CVE-2021-0294MEDIUMCVSS 5.3v18.4R2-S52021-07-15
CVE-2021-0294 [MEDIUM] CWE-474 CVE-2021-0294: A vulnerability in Juniper Networks Junos OS, which only affects the release 18.4R2-S5, where a func
A vulnerability in Juniper Networks Junos OS, which only affects the release 18.4R2-S5, where a function is inconsistently implemented on Juniper Networks Junos QFX5000 Series and EX4600 Series, and if "storm-control enhanced" is configured, can lead to the enhanced storm control filter group not be installed. It will cause storm control not to work h
cvelistv5nvd
CVE-2021-0289MEDIUMCVSS 5.3≥ 5.6R1, < 5.6*≥ 15.1, < 15.1R7-S10+16 more2021-07-15
CVE-2021-0289 [MEDIUM] CWE-367 CVE-2021-0289: When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) inte
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this pa
cvelistv5nvd
CVE-2021-0293MEDIUMCVSS 5.5≥ 18.3, < 18.3R3-S4≥ 18.4, < 18.4R1-S8, 18.4R2-S6, 18.4R3-S7+8 more2021-07-15
CVE-2021-0293 [MEDIUM] CWE-401 CVE-2021-0293: A vulnerability in Juniper Networks Junos OS caused by Missing Release of Memory after Effective Lif
A vulnerability in Juniper Networks Junos OS caused by Missing Release of Memory after Effective Lifetime leads to a memory leak each time the CLI command 'show system connections extensive' is executed. The amount of memory leaked on each execution depends on the number of TCP connections from and to the system. Repeated execution will cause more mem
cvelistv5nvd
CVE-2021-0248CRITICALCVSS 10.0≥ unspecified, < 19.1R12021-04-22
CVE-2021-0248 [CRITICAL] CWE-798 CVE-2021-0248: This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Cr
This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Credentials in Juniper Networks Junos OS allows an attacker to take over any instance of an NFX deployment. This issue is only exploitable through administrative interfaces. This issue affects: Juniper Networks Junos OS versions prior to 19.1R1 on NFX S
cvelistv5nvd
CVE-2021-0268CRITICALCVSS 9.3≥ 18.1, < 18.1R3-S11≥ 18.2, < 18.2R3-S5+7 more2021-04-22
CVE-2021-0268 [CRITICAL] CWE-79 CVE-2021-0268: An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in
An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication. The weakness can be exp
cvelistv5nvd
CVE-2021-0254CRITICALCVSS 9.8≥ 15.1, < 15.1R7-S9≥ 17.3, < 17.3R3-S11+12 more2021-04-22
CVE-2021-0254 [CRITICAL] CWE-131 CVE-2021-0254: A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allo
A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to remote code execution (RCE). Continued receipt and processing of these packets will sustain the
cvelistv5nvd
CVE-2021-0249CRITICALCVSS 9.8≥ 15.1X49, < 15.1X49-D190≥ 17.4, < 17.4R2-S9+6 more2021-04-22
CVE-2021-0249 [CRITICAL] CWE-120 CVE-2021-0249: On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet For
On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise impact the device by sending crafted packets to or through the device. This issue affects: Juniper
cvelistv5nvd