Juniper Networks Junos OS Evolved vulnerabilities
244 known vulnerabilities affecting juniper_networks/junos_os_evolved.
Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96
Vulnerabilities
Page 11 of 13
CVE-2021-31350HIGHCVSS 8.8≥ unspecified, < 20.4R2-EVO≥ 21.1-EVO, < 21.1R2-EVO2021-10-19
CVE-2021-31350 [HIGH] CWE-269 CVE-2021-31350: An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system. The issue is caused by the JET servic
cvelistv5nvd
CVE-2021-31357HIGHCVSS 7.8≥ unspecified, < 20.3R2-S1-EVO≥ 20.4, < 20.4R2-S2-EVO+2 more2021-10-19
CVE-2021-31357 [HIGH] CWE-77 CVE-2021-31357: A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved
A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user. The vulnerability allows an attacker to bypass command authorization restrict
cvelistv5nvd
CVE-2021-31374HIGHCVSS 7.5≥ 20.3, < 20.3R2-EVO2021-10-19
CVE-2021-31374 [HIGH] CWE-787 CVE-2021-31374: On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE
On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this message will create a sustained Denial of Service (DoS) condition. This issue affects both IBGP
cvelistv5nvd
CVE-2021-31359HIGHCVSS 7.8≥ unspecified, < 20.4R2-S3-EVO≥ 21.1R1-EVO, < 21.1*2021-10-19
CVE-2021-31359 [HIGH] CWE-121 CVE-2021-31359: A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows
A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary commands as root. Continued processing of malicious input will repeatedly crash the system and sustain t
cvelistv5nvd
CVE-2021-31356HIGHCVSS 7.8≥ unspecified, < 20.4R3-S1-EVO≥ 21.1R1-EVO, < 21.1*+1 more2021-10-19
CVE-2021-31356 [HIGH] CWE-77 CVE-2021-31356: A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows
A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user. The vulnerability allows an attacker to bypass command authorization restrictions assi
cvelistv5nvd
CVE-2021-31363MEDIUMCVSS 6.5≥ unspecified, < 20.1R2-S3-EVO≥ 20.3, < 20.3R1-S2-EVO2021-10-19
CVE-2021-31363 [MEDIUM] CWE-835 CVE-2021-31363: In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing prot
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps. If a system with sensor-based-stats enabled receives a specific
cvelistv5nvd
CVE-2021-0298MEDIUMCVSS 4.7≥ unspecified, < 20.1R2-EVO2021-10-19
CVE-2021-0298 [MEDIUM] CWE-362 CVE-2021-0298: A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an
A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial of Service (DoS) condition. Continued execution of th
cvelistv5nvd
CVE-2021-0297MEDIUMCVSS 6.5≥ unspecified, < 20.3R2-S1-EVO≥ 20.4, < 20.4R2-EVO+1 more2021-10-19
CVE-2021-0297 [MEDIUM] CWE-755 CVE-2021-0297: A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may
A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could lead to untrusted or unauthorized sessions being established, resulting in an impact on confidentiality
cvelistv5nvd
CVE-2021-31362MEDIUMCVSS 6.5≥ unspecified, < 20.4R2-EVO≥ 21.1, < 21.1R2-EVO2021-10-19
CVE-2021-31362 [MEDIUM] CWE-693 CVE-2021-31362: A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Ju
A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU leading to a Denial of Service (DoS) condition. Continued receipted of these spoofed PDUs will cre
cvelistv5nvd
CVE-2021-0286HIGHCVSS 7.5≥ unspecified, < 20.4R2-EVO≥ 21.1, < 21.1R2-EVO2021-07-15
CVE-2021-0286 [HIGH] CWE-703 CVE-2021-0286: A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO)
A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all traffic going through the FPC, resulting in a Denial of Ser
cvelistv5nvd
CVE-2021-0277HIGHCVSS 8.8≥ unspecified, < 20.4R2-EVO2021-07-15
CVE-2021-0277 [HIGH] CWE-125 CVE-2021-0277: An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer
An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS), or may lead to remote code execution (RCE). Continued receipt and processing of these frames, sent from the local
cvelistv5nvd
CVE-2021-0281HIGHCVSS 7.5≥ All, < 20.4R2-S2-EVO2021-07-15
CVE-2021-0281 [HIGH] CWE-754 CVE-2021-0281: On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key
On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustain
cvelistv5nvd
CVE-2021-0291MEDIUMCVSS 6.5≥ unspecified, < 20.3R2-EVO2021-07-15
CVE-2021-0291 [MEDIUM] CWE-497 CVE-2021-0291: An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource. A high rate of specific traffic may lead to a partial Denial of Service (
cvelistv5nvd
CVE-2021-0287MEDIUMCVSS 6.5≥ 19.4R1-EVO, < 19.4*≥ 20.1R1-EVO, < 20.1*+3 more2021-07-15
CVE-2021-0287 [MEDIUM] CWE-754 CVE-2021-0287: In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evol
In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued link f
cvelistv5nvd
CVE-2021-0292MEDIUMCVSS 6.5≥ 19.4, < 19.4R2-S3-EVO≥ 20.1, < 20.1R2-S4-EVO+1 more2021-07-15
CVE-2021-0292 [MEDIUM] CWE-400 CVE-2021-0292: An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Pr
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition. Link-layer functions such as IPv4 and/or IPv6 address re
cvelistv5nvd
CVE-2021-0259HIGHCVSS 7.4≥ unspecified, < 20.3R2-EVO2021-04-22
CVE-2021-0259 [HIGH] CWE-755 CVE-2021-0259: Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a client device on the overlay network sends a high volume
cvelistv5nvd
CVE-2021-0250HIGHCVSS 7.5≥ 19.2-EVO, < 19.2R2-EVO2021-04-22
CVE-2021-0250 [HIGH] CVE-2021-0250: In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) f
In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific crafted BGP update message causing the RPD service to core, creating a Denial of Service (DoS) Condition. Continued r
cvelistv5nvd
CVE-2021-0226HIGHCVSS 7.5≥ 19.4-EVO, < 19.4R2-S3-EVO≥ 20.1-EVO, < 20.1R2-S3-EVO+2 more2021-04-22
CVE-2021-0226 [HIGH] CWE-665 CVE-2021-0226: On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an establi
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects I
cvelistv5nvd
CVE-2021-0264HIGHCVSS 7.5≥ unspecified, < 20.4R2-EVO2021-04-22
CVE-2021-0264 [HIGH] CWE-703 CVE-2021-0264: A vulnerability in the processing of traffic matching a firewall filter containing a syslog action i
A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of Service (DoS). Continued receipt and processing of packets matching the fi
cvelistv5nvd
CVE-2021-0273MEDIUMCVSS 5.3≥ 19.4, < 19.4R2-EVO2021-04-22
CVE-2021-0273 [MEDIUM] CWE-670 CVE-2021-0273: An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Jun
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to exploit an interdependency in the PFE UCODE microcode of the Trio chipset with various line cards to ca
cvelistv5nvd