Juniper Networks Junos Os vulnerabilities

652 known vulnerabilities affecting juniper_networks/junos_os.

Total CVEs
652
CISA KEV
7
actively exploited
Public exploits
6
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH348MEDIUM270

Vulnerabilities

Page 27 of 33
CVE-2019-0064HIGHCVSS 7.5v18.2R3v18.4R2+1 more2019-10-09
CVE-2019-0064 [HIGH] CVE-2019-0064: On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the f On SRX5000 Series devices, if 'set security zones security-zone tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the devi
nvd
CVE-2019-0057HIGHCVSS 7.8≥ unspecified, < 18.2R1, 18.2X75-D52019-10-09
CVE-2019-0057 [HIGH] CVE-2019-0057: An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacke An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.2X75-D5.
nvd
CVE-2019-0050HIGHCVSS 7.5≥ 15.1X49, < 15.1X49-D170≥ 17.3, < 17.3R3-S7 (pending)+5 more2019-10-09
CVE-2019-0050 [HIGH] CVE-2019-0050: Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service co Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service condition for the SRX1500 device. Repeated crashes of the srxpfe can result in an extended denial of service condition. The SRX device may fail to forward traffic when this condition occurs. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to
nvd
CVE-2019-0068HIGHCVSS 7.5v17.3≥ 12.3X48, < 12.3X48-D90+7 more2019-10-09
CVE-2019-0068 [HIGH] CWE-754 CVE-2019-0068: The SRX flowd process, responsible for packet forwarding, may crash and restart when processing spec The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to
nvd
CVE-2019-0075HIGHCVSS 7.5≥ 12.3X48, < 12.3X48-D80≥ 15.1X49, < 15.1X49-D160+5 more2019-10-09
CVE-2019-0075 [HIGH] CVE-2019-0075: A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series dev A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an extended denial of service condition. Affected releases are Juniper Networks Junos OS on SRX Series: 12.3X48 versions
nvd
CVE-2019-0065HIGHCVSS 7.5≥ 16.1, < 16.1R7-S5≥ 16.2, < 16.2R2-S11+8 more2019-10-09
CVE-2019-0065 [HIGH] CVE-2019-0065: On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the M On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior
nvd
CVE-2019-0054HIGHCVSS 7.4≥ 15.1X49, < 15.1X49-D1202019-10-09
CVE-2019-0054 [HIGH] CWE-295 CVE-2019-0054: An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) si An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to
nvd
CVE-2019-0063HIGHCVSS 7.5≥ 15.1, < 15.1R7-S5≥ 16.1, < 16.1R7-S5+11 more2019-10-09
CVE-2019-0063 [HIGH] CVE-2019-0063: When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly cras
nvd
CVE-2019-0058HIGHCVSS 7.8≥ 12.3X48, < 12.3X48-D802019-10-09
CVE-2019-0058 [HIGH] CVE-2019-0058: A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3
nvd
CVE-2019-0055HIGHCVSS 7.5≥ 12.3X48, < 12.3X48-D61, 12.3X48-D65≥ 15.1X49, < 15.1X49-D130+2 more2019-10-09
CVE-2019-0055 [HIGH] CWE-130 CVE-2019-0055: A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an atta A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing SIP ALG traffic. Continued receipt of these valid SIP pa
nvd
CVE-2019-0071HIGHCVSS 7.8v18.1R3-S4v18.3R1-S32019-10-09
CVE-2019-0071 [HIGH] CWE-347 CVE-2019-0071: Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binarie Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user wi
nvd
CVE-2019-0060HIGHCVSS 7.5≥ 15.1X49, < 15.1X49-D171, 15.1X49-D180≥ 18.2R2-S1, < 18.2*+1 more2019-10-09
CVE-2019-0060 [HIGH] CWE-755 CVE-2019-0060: The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs when IPSec tunnels are configured. Systems without IPSe
nvd
CVE-2019-0066HIGHCVSS 7.5≥ 15.1, < 15.1F6-S12, 15.1R7-S2≥ 16.1, < 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2+6 more2019-10-09
CVE-2019-0066 [HIGH] CWE-394 CVE-2019-0066: An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted an
nvd
CVE-2019-0056HIGHCVSS 7.5≥ 18.1, < 18.1R2-S4, 18.1R3-S5≥ 18.2, < 18.2R1-S5, 18.2R2-S3, 18.2R3+4 more2019-10-09
CVE-2019-0056 [HIGH] CWE-410 CVE-2019-0056: This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OS This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device's Open Shortest Path First (OSPF) states to transition to Down, resulting in a Denial of Service (DoS) attack. This attack requires a re
nvd
CVE-2019-0051HIGHCVSS 7.5≥ 12.3X48, < 12.3X48-D85≥ 15.1X49, < 15.1X49-D180+7 more2019-10-09
CVE-2019-0051 [HIGH] CWE-755 CVE-2019-0051: SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploit SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients protected by the SRX device must initiate a connection to the malicious se
nvd
CVE-2019-0070HIGHCVSS 8.8≥ unspecified, < 18.2R12019-10-09
CVE-2019-0070 [HIGH] CWE-20 CVE-2019-0070: An Improper Input Validation weakness allows a malicious local attacker to elevate their permissions An Improper Input Validation weakness allows a malicious local attacker to elevate their permissions to take control of other portions of the NFX platform they should not be able to access, and execute commands outside their authorized scope of control. This leads to the attacker being able to take control of the entire system. This issue affects: Junipe
nvd
CVE-2019-0061HIGHCVSS 7.8≥ 15.1X49, < 15.1X49-D171, 15.1X49-D180≥ 15.1X53, < 15.1X53-D496, 15.1X53-D69+10 more2019-10-09
CVE-2019-0061 [HIGH] CWE-657 CVE-2019-0061: The management daemon (MGD) is responsible for all configuration and management operations in Junos The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vuln
nvd
CVE-2019-0059HIGHCVSS 7.5v18.1X75 all versions≥ 18.1, < 18.1R2-S4, 18.1R3-S12019-10-09
CVE-2019-0059 [HIGH] CWE-400 CVE-2019-0059: A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.1X75 all ver
nvd
CVE-2019-0047HIGHCVSS 8.8≥ 12.1X46, < 12.1X46-D86≥ 12.3, < 12.3R12-S13+15 more2019-10-09
CVE-2019-0047 [HIGH] CWE-79 CVE-2019-0047: A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote u A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perform certain diagnostic actions on J-Web. This issue affects: Juniper Networks Junos OS 12.1X46 versions prio
nvd
CVE-2019-0062HIGHCVSS 8.8≥ 12.3, < 12.3R12-S15≥ 12.3X48, < 12.3X48-D85+15 more2019-10-09
CVE-2019-0062 [HIGH] CWE-384 CVE-2019-0062: A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineerin A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D8
nvd