Juniper Networks Junos Os vulnerabilities

652 known vulnerabilities affecting juniper_networks/junos_os.

Total CVEs
652
CISA KEV
7
actively exploited
Public exploits
6
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH348MEDIUM270

Vulnerabilities

Page 25 of 33
CVE-2020-1648HIGHCVSS 7.5≥ 18.2X75-D50.8 18.2X75-D60, < 18.2X75*≥ 20.1, < 20.1R1-S2, 20.1R22020-07-17
CVE-2020-1648 [HIGH] CWE-159 CVE-2020-1648: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affec
nvd
CVE-2020-1649HIGHCVSS 7.5≥ 17.2, < 17.2R3-S4≥ 17.3, < 17.3R3-S8+9 more2020-07-17
CVE-2020-1649 [HIGH] CVE-2020-1649: When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and th When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of small fragments requiring reassembly, generating the following error messages: [LOG: Err] MQSS(2): WO: Pac
nvd
CVE-2020-1644HIGHCVSS 7.5≥ 17.2X75, < 17.2X75-D105.19≥ 17.3, < 17.3R3-S8+10 more2020-07-17
CVE-2020-1644 [HIGH] CWE-703 CVE-2020-1644: On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE pack On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBGP multihop deployment in IPv4 or IPv6 network. This issue affects: Juniper
nvd
CVE-2020-1645HIGHCVSS 8.3≥ 17.3, < 17.3R3-S8≥ 18.3, < 18.3R2-S4, 18.3R3-S1+5 more2020-07-17
CVE-2020-1645 [HIGH] CWE-362 CVE-2020-1645: When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart. While the Services PIC is resta
nvd
CVE-2020-1650HIGHCVSS 7.5v17.2R2-S7v17.3R3-S4, 17.3R3-S5+9 more2020-07-17
CVE-2020-1650 [HIGH] CVE-2020-1650: On Juniper Networks Junos MX Series with service card configured, receipt of a stream of specific pa On Juniper Networks Junos MX Series with service card configured, receipt of a stream of specific packets may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending these specific packets, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a prolonged Denial of Service. This issue affects MX Series devices using MS-PIC, MS-MI
nvd
CVE-2020-1640HIGHCVSS 7.5≥ 16.1R7-S6, < 16.1*≥ 17.3R2-S5, 17.3R3-S6, < 17.3*+11 more2020-07-17
CVE-2020-1640 [HIGH] CWE-1173 CVE-2020-1640: An improper use of a validation framework when processing incoming genuine BGP packets within Junipe An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuously sending any of these types of formatted genuine pac
nvd
CVE-2020-1653HIGHCVSS 7.5≥ 17.4, < 17.4R2-S11, 17.4R3-S2≥ 18.1, < 18.1R3-S10+8 more2020-07-17
CVE-2020-1653 [HIGH] CWE-159 CVE-2020-1653: On Juniper Networks Junos OS devices, a stream of TCP packets sent to the Routing Engine (RE) may ca On Juniper Networks Junos OS devices, a stream of TCP packets sent to the Routing Engine (RE) may cause mbuf leak which can lead to Flexible PIC Concentrator (FPC) crash or the system to crash and restart (vmcore). This issue can be trigged by IPv4 or IPv6 and it is caused only by TCP packets. This issue is not related to any specific configuration and
nvd
CVE-2020-1646HIGHCVSS 7.5v17.3R3-S6v17.4R2-S7+1 more2020-07-17
CVE-2020-1646 [HIGH] CWE-159 CVE-2020-1646: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when the device is receiving and processing the BGP UPDATE for
nvd
CVE-2020-1651MEDIUMCVSS 6.5≥ 17.2, < 17.2R3-S4≥ 17.2X75, < 17.2X75-D105.19+3 more2020-07-17
CVE-2020-1651 [MEDIUM] CWE-19 CVE-2020-1651: On Juniper Networks MX series, receipt of a stream of specific Layer 2 frames may cause a memory lea On Juniper Networks MX series, receipt of a stream of specific Layer 2 frames may cause a memory leak resulting in the packet forwarding engine (PFE) on the line card to crash and restart, causing traffic interruption. By continuously sending this stream of specific layer 2 frame, an attacker connected to the same broadcast domain can repeatedly crash
nvd
CVE-2020-1641MEDIUMCVSS 6.5≥ 12.3, < 12.3R12-S15≥ 12.3X48, < 12.3X48-D95+14 more2020-07-17
CVE-2020-1641 [MEDIUM] CWE-362 CVE-2020-1641: A Race Condition vulnerability in Juniper Networks Junos OS LLDP implementation allows an attacker t A Race Condition vulnerability in Juniper Networks Junos OS LLDP implementation allows an attacker to cause LLDP to crash leading to a Denial of Service (DoS). This issue occurs when crafted LLDP packets are received by the device from an adjacent device. Multiple LACP flaps will occur after LLDP crashes. An indicator of compromise is to evaluate log
nvd
CVE-2020-1655MEDIUMCVSS 5.3≥ 17.2, < 17.2R3-S4≥ 17.3, < 17.3R3-S8+9 more2020-07-17
CVE-2020-1655 [MEDIUM] CVE-2020-1655: When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and th When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of large packets requiring fragmentation, generating the following error messages: [LOG: Err] MQSS(0): WO:
nvd
CVE-2020-1643MEDIUMCVSS 5.5≥ 12.3X48, < 12.3X48-D100≥ 14.1X53, < 14.1X53-D140, 14.1X53-D54+12 more2020-07-17
CVE-2020-1643 [MEDIUM] CWE-755 CVE-2020-1643: Execution of the "show ospf interface extensive" or "show ospf interface detail" CLI commands on a J Execution of the "show ospf interface extensive" or "show ospf interface detail" CLI commands on a Juniper Networks device running Junos OS may cause the routing protocols process (RPD) to crash and restart if OSPF interface authentication is configured, leading to a Denial of Service (DoS). By continuously executing the same CLI commands, a local att
nvd
CVE-2020-1631CRITICALCVSS 9.8KEV≥ 12.3, < 12.3R12-S16≥ 12.3X48, < 12.3X48-D101, 12.3X48-D105+16 more2020-05-04
CVE-2020-1631 [CRITICAL] CWE-22 CVE-2020-1631: A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Fir A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclusion (LFI) or path traversal. Using this vulnerability, an attacker may be able to inject commands into
nvd
CVE-2020-1632HIGHCVSS 8.6≥ 16.1, < 16.1R7-S6≥ 16.2, < 16.2R2-S11+12 more2020-04-15
CVE-2020-1632 [HIGH] CWE-755 CVE-2020-1632: In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Service (DoS) condition. For example, Router A sends a specific BGP UPDATE to
nvd
CVE-2020-1633MEDIUMCVSS 6.5≥ 17.4, < 17.4R2-S9, 17.4R3≥ 18.1, < 18.1R3-S9+6 more2020-04-09
CVE-2020-1633 [MEDIUM] CWE-20 CVE-2020-1633: Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packet Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition. This issu
nvd
CVE-2020-1615CRITICALCVSS 9.8≥ 17.1, < 17.1R2-S11, 17.1R3-S2≥ 17.2, < 17.2R3-S3+10 more2020-04-08
CVE-2020-1615 [CRITICAL] CWE-798 CVE-2020-1615: The factory configuration for vMX installations, as shipped, includes default credentials for the ro The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the vMX instance without authorization. This issue affects Juniper Networks Junos OS: 17.1 versions prior
nvd
CVE-2020-1617HIGHCVSS 7.5≥ 17.4, < 17.4R2-S9, 17.4R3≥ 18.1, ≤ 18.1R3-S9+3 more2020-04-08
CVE-2020-1617 [HIGH] CWE-665 CVE-2020-1617: This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Inte This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to this issue. An improper initialization of memory in the packet forwarding architecture in Juniper Networks Junos OS non-AFI/AFT platforms which may lead to a
nvd
CVE-2020-1638HIGHCVSS 7.5≥ 19.2, < 19.2R1-S4, 19.2R2≥ 19.3, < 19.3R2-S2, 19.3R3+1 more2020-04-08
CVE-2020-1638 [HIGH] CWE-467 CVE-2020-1638: The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart af The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plane filtering, will be able to cause the FPC restart. When this issue occurs, all traffic via the FPC will
nvd
CVE-2020-1639HIGHCVSS 7.5≥ 12.3, < 12.3R12-S15≥ 14.1X50, < 14.1X50-D145+5 more2020-04-08
CVE-2020-1639 [HIGH] CWE-703 CVE-2020-1639: When an attacker sends a specific crafted Ethernet Operation, Administration, and Maintenance (Ether When an attacker sends a specific crafted Ethernet Operation, Administration, and Maintenance (Ethernet OAM) packet to a target device, it may improperly handle the incoming malformed data and fail to sanitize this incoming data resulting in an overflow condition. This overflow condition in Juniper Networks Junos OS allows an attacker to cause a Denial
nvd
CVE-2020-1627HIGHCVSS 7.5≥ 18.1, < 18.1R3≥ 18.2, < 18.2R3+4 more2020-04-08
CVE-2020-1627 [HIGH] CVE-2020-1627: A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending the same specific packets, an attacker can repeatedly crash the
nvd