Juniper Networks Junos Os vulnerabilities
659 known vulnerabilities affecting juniper_networks/junos_os.
Total CVEs
659
CISA KEV
7
actively exploited
Public exploits
4
Exploited in wild
6
Severity breakdown
CRITICAL34HIGH352MEDIUM273
Vulnerabilities
Page 3 of 33
CVE-2025-59964HIGHCVSS 8.7≥ 24.4, < 24.4R1-S3, 24.4R22025-10-09
CVE-2025-59964 [HIGH] CWE-908 CVE-2025-59964: A Use of Uninitialized Resource vulnerability in the Packet Forwarding Engine (PFE) of Juniper Netwo
A Use of Uninitialized Resource vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX4700 devices allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
When forwarding-options sampling is enabled, receipt of any traffic destined to the Routing Engine (RE) by the PFE line card leads to
cvelistv5nvd
CVE-2025-59968HIGHCVSS 7.7v02025-10-09
CVE-2025-59968 [HIGH] CWE-862 CVE-2025-59968: A Missing Authorization vulnerability in the Juniper Networks Junos Space Security Director allows a
A Missing Authorization vulnerability in the Juniper Networks Junos Space Security Director allows an unauthenticated network-based attacker to read or modify metadata via the web interface.
Tampering with this metadata can result in managed SRX Series devices permitting network traffic that should otherwise be blocked by policy, effectively bypassi
cvelistv5nvd
CVE-2025-59957HIGHCVSS 7.0fixed in 21.4R3≥ 22.2, < 22.2R3-S32025-10-09
CVE-2025-59957 [HIGH] CWE-346 CVE-2025-59957: An Origin Validation Error vulnerability in an insufficient protected file of Juniper Networks Junos
An Origin Validation Error vulnerability in an insufficient protected file of Juniper Networks Junos OS on EX4600 Series and QFX5000 Series allows an unauthenticated attacker with physical access to the device to create a backdoor which allows complete control of the system.
When a device isn't configured with a root password, an attacker can modify
cvelistv5nvd
CVE-2025-60004HIGHCVSS 8.7≥ 23.4R2-S3, < 23.4R2-S5≥ 24.2R2, < 24.2R2-S1+1 more2025-10-09
CVE-2025-60004 [HIGH] CWE-754 CVE-2025-60004: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS).
When an affected system receives a specific BGP EVPN update message over an established BGP session, this cau
cvelistv5nvd
CVE-2025-60010MEDIUMCVSS 5.3fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S4+3 more2025-10-09
CVE-2025-60010 [MEDIUM] CWE-262 CVE-2025-60010: A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolve
A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change.
Affected devices allow logins by users for whom the RADIUS server has responded with a reject and required the user to change the p
cvelistv5nvd
CVE-2025-59962MEDIUMCVSS 6.0≥ 21.4, < 21.4R3-S6≥ 22.1, < 22.1R3-S6+4 more2025-10-09
CVE-2025-59962 [MEDIUM] CWE-824 CVE-2025-59962: An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Net
An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP sharding configured allows an attacker triggering indirect next-hop updates, along with timing outside the attacker's control, to cause rpd to crash and restart, leading to a Denial of Service (DoS).
With
cvelistv5nvd
CVE-2025-59980MEDIUMCVSS 6.9fixed in 22.4R3-S8≥ 23.2, < 23.2R2-S3+1 more2025-10-09
CVE-2025-59980 [MEDIUM] CWE-305 CVE-2025-59980: An Authentication Bypass by Primary Weakness
in the FTP server of Juniper Networks Junos OS allows
An Authentication Bypass by Primary Weakness
in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device.
When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and th
cvelistv5nvd
CVE-2025-52949HIGHCVSS 7.1fixed in 21.4R3-S11≥ 22.2, < 22.2R3-S7+5 more2025-07-11
CVE-2025-52949 [HIGH] CWE-130 CVE-2025-52949: An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this p
cvelistv5nvd
CVE-2025-52983HIGHCVSS 8.6fixed in 22.2R3-S7≥ 22.4, < 22.4R3-S5+3 more2025-07-11
CVE-2025-52983 [HIGH] CWE-446 CVE-2025-52983: A UI Discrepancy for Security Feature
vulnerability in the UI of Juniper Networks Junos OS on VM Ho
A UI Discrepancy for Security Feature
vulnerability in the UI of Juniper Networks Junos OS on VM Host systems allows a network-based, unauthenticated attacker to access the device.
On VM Host Routing Engines (RE), even if the configured public key for root has been removed, remote users which are in possession of the corresponding private key can s
cvelistv5nvd
CVE-2025-52964HIGHCVSS 7.1fixed in 21.4R3-S7≥ 22.3, < 22.3R3-S3+5 more2025-07-11
CVE-2025-52964 [HIGH] CWE-617 CVE-2025-52964: A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos O
A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
When the device receives a specific BGP UPDATE packet, the rpd crashes and restarts. Continuous receipt of this specific packet will cause a su
cvelistv5nvd
CVE-2025-52984HIGHCVSS 8.2fixed in 21.2R3-S9≥ 21.4, < 21.4R3-S10+5 more2025-07-11
CVE-2025-52984 [HIGH] CWE-476 CVE-2025-52984: A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Ju
A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device.
When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts
cvelistv5nvd
CVE-2025-52981HIGHCVSS 7.1fixed in 21.2R3-S9≥ 21.4, < 21.4R3-S11+5 more2025-07-11
CVE-2025-52981 [HIGH] CWE-754 Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash
Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on
SRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3
allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
If a sequence of speci
cvelistv5
CVE-2025-52955HIGHCVSS 7.1fixed in 21.2R3-S9≥ 21.4, < 21.4*+5 more2025-07-11
CVE-2025-52955 [HIGH] CWE-131 CVE-2025-52955: An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Junipe
An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a memory corruption that leads to a rpd crash.
When
the logical interface using a routing instance flaps continuously, specific updates are sent to the jflow
cvelistv5nvd
CVE-2025-52947HIGHCVSS 7.1fixed in 21.2R3-S92025-07-11
CVE-2025-52947 [HIGH] CWE-755 CVE-2025-52947: An Improper Handling of Exceptional Conditions vulnerability in route processing of Juniper Networks
An Improper Handling of Exceptional Conditions vulnerability in route processing of Juniper Networks Junos OS on specific end-of-life (EOL) ACX Series platforms allows an attacker to crash the Forwarding Engine Board (FEB) by flapping an interface, leading to a Denial of Service (DoS).
On ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048,
cvelistv5nvd
CVE-2025-52948HIGHCVSS 8.2fixed in 21.2R3-S9≥ 21.4, < 21.4R3-S10+5 more2025-07-11
CVE-2025-52948 [HIGH] CWE-755 CVE-2025-52948: An Improper Handling of Exceptional Conditions vulnerability in Berkeley Packet Filter (BPF) process
An Improper Handling of Exceptional Conditions vulnerability in Berkeley Packet Filter (BPF) processing of Juniper Networks Junos OS allows an attacker, in rare cases, sending specific, unknown traffic patterns to cause the FPC and system to crash and restart.
BPF provides a raw interface to data link layers in a protocol independent fashion. Interna
cvelistv5nvd
CVE-2025-52982HIGHCVSS 8.2fixed in 21.2R3-S9≥ 21.4, < 21.4*+2 more2025-07-11
CVE-2025-52982 [HIGH] CWE-404 CVE-2025-52982: An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS o
An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence o
cvelistv5nvd
CVE-2025-52952HIGHCVSS 7.1fixed in 22.2R3-S1≥ 22.4, < 22.4R22025-07-11
CVE-2025-52952 [HIGH] CWE-787 CVE-2025-52952: An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Ne
An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Networks Junos OS on MX Series with MPC-BUILTIN, MPC1 through MPC9 line cards allows an unauthenticated adjacent attacker to send a malformed packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS).
Continued rec
cvelistv5nvd
CVE-2025-52946HIGHCVSS 8.7fixed in 21.2R3-S9≥ 21.4, < *+5 more2025-07-11
CVE-2025-52946 [HIGH] CWE-416 Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash
Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash
A Use After Free vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an attacker sending a BGP update with a specifically malformed AS PATH to cause rpd to crash, resulting in a Denial of
cvelistv5
CVE-2025-52988HIGHCVSS 8.4fixed in 21.2R3-S9≥ 21.4, < 21.4R3-S8+5 more2025-07-11
CVE-2025-52988 [HIGH] CWE-78 CVE-2025-52988: An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulner
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root.
When a user provides specifically crafted arguments to the 'request system logout' command, these will b
cvelistv5nvd
CVE-2025-30661HIGHCVSS 8.5≥ 23.2, < 23.2R2-S4≥ 23.4, < 23.4R2-S5+2 more2025-07-11
CVE-2025-30661 [HIGH] CWE-732 CVE-2025-30661: An Incorrect Permission Assignment for Critical Resource vulnerability in line card script processin
An Incorrect Permission Assignment for Critical Resource vulnerability in line card script processing of Juniper Networks Junos OS allows a local, low-privileged user to install scripts to be executed as root, leading to privilege escalation.
A local user with access to the local file system can copy a script to the router in a way that will be execu
cvelistv5nvd