Juniper Networks Junos OS Evolved vulnerabilities
244 known vulnerabilities affecting juniper_networks/junos_os_evolved.
Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96
Vulnerabilities
Page 12 of 13
CVE-2021-0225MEDIUMCVSS 5.8≥ 19.1R1-EVO, < unspecified≥ 20.3-EVO, < 20.3R1-S2-EVO, 20.3R2-EVO2021-04-22
CVE-2021-0225 [MEDIUM] CWE-754 CVE-2021-0225: An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cau
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An administrator can use the following CLI command to see the failures with filter configuration: user@device>
cvelistv5nvd
CVE-2021-0239MEDIUMCVSS 6.5≥ unspecified, < 20.4R1-EVO2021-04-22
CVE-2021-0239 [MEDIUM] CWE-754 CVE-2021-0239: In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cau
In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash and restart, leading to a Denial of Service (DoS) cond
cvelistv5nvd
CVE-2021-0236MEDIUMCVSS 6.5≥ 20.3-EVO, < 20.3R2-EVO2021-04-22
CVE-2021-0236 [MEDIUM] CWE-754 CVE-2021-0236: Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Juno
Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of Service (DoS). Continued receipt and processing of thi
cvelistv5nvd
CVE-2021-0211CRITICALCVSS 10.0≥ unspecified, < 20.3R1-S1-EVO, 20.3R2-EVO2021-01-15
CVE-2021-0211 [CRITICAL] CWE-754 CVE-2021-0211: An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Ev
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Den
cvelistv5nvd
CVE-2021-0208HIGHCVSS 8.8≥ 19.3, < 19.3R2-S5-EVO≥ 19.4, < 19.4R2-S2-EVO+1 more2021-01-15
CVE-2021-0208 [HIGH] CWE-20 CVE-2021-0208: An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper N
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition. Continued receipt of the packet will sustain the De
cvelistv5nvd
CVE-2021-0209MEDIUMCVSS 6.5≥ 19.4, < 19.4R2-S2-EVO≥ 20.1, < 20.1R1-S2-EVO, 20.1R2-S1-EVO2021-01-15
CVE-2021-0209 [MEDIUM] CWE-824 CVE-2021-0209: In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to r
cvelistv5nvd
CVE-2020-1662HIGHCVSS 7.5v19.4-EVO≥ 20.1-EVO, < 20.1R2-EVO2020-10-16
CVE-2020-1662 [HIGH] CWE-20 CVE-2020-1662: On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routin
On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit configuration. When the issue occurs the following messages will appea
cvelistv5nvd
CVE-2020-1681MEDIUMCVSS 6.5≥ all, < 20.1R2-EVO2020-10-16
CVE-2020-1681 [MEDIUM] CWE-755 CVE-2020-1681: Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device ru
Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt of the malformed NDP packets could leaded to an extende
cvelistv5nvd
CVE-2020-1666MEDIUMCVSS 6.6≥ unspecified, < 20.2R1-EVO2020-10-16
CVE-2020-1666 [MEDIUM] CWE-284 CVE-2020-1666: The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. T
cvelistv5nvd
CVE-2020-1678MEDIUMCVSS 6.5v19.4-EVO≥ 20.1-EVO, < 20.1R1-S4-EVO, 20.1R2-EVO2020-10-16
CVE-2020-1678 [MEDIUM] CWE-400 CVE-2020-1678: On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specifi
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task memory detail | match policy | match evpn" command multiple times to check if
cvelistv5nvd
CVE-2020-1648HIGHCVSS 7.5≥ 20.1-EVO, < 20.1R2-EVO2020-07-17
CVE-2020-1648 [HIGH] CWE-159 CVE-2020-1648: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affec
cvelistv5nvd
CVE-2020-1644HIGHCVSS 7.5v19.2-EVOv19.3-EVO+2 more2020-07-17
CVE-2020-1644 [HIGH] CWE-703 CVE-2020-1644: On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE pack
On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBGP multihop deployment in IPv4 or IPv6 network. This issue affects: Juniper
cvelistv5nvd
CVE-2020-1646HIGHCVSS 7.5≥ unspecified, < 19.3R1-EVO≥ 19.2R2-EVO, < 19.2-EVO*2020-07-17
CVE-2020-1646 [HIGH] CWE-159 CVE-2020-1646: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when the device is receiving and processing the BGP UPDATE for
cvelistv5nvd
CVE-2020-1632HIGHCVSS 8.6≥ unspecified, < 19.2R2-EVO2020-04-15
CVE-2020-1632 [HIGH] CWE-755 CVE-2020-1632: In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Service (DoS) condition. For example, Router A sends a specific BGP UPDATE to
cvelistv5nvd
CVE-2020-1626HIGHCVSS 7.5≥ unspecified, < 19.1R1-EVO2020-04-08
CVE-2020-1626 [HIGH] CVE-2020-1626: A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Serv
A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfeman
cvelistv5nvd
CVE-2020-1638HIGHCVSS 7.5v19.2-EVOv19.3-EVO 19.2-EVO+1 more2020-04-08
CVE-2020-1638 [HIGH] CWE-467 CVE-2020-1638: The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart af
The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plane filtering, will be able to cause the FPC restart. When this issue occurs, all traffic via the FPC will
cvelistv5nvd
CVE-2020-1620MEDIUMCVSS 5.5≥ unspecified, < 19.3R1-EVO2020-04-08
CVE-2020-1620 [MEDIUM] CWE-664 CVE-2020-1620: A local, authenticated user with shell can obtain the hashed values of login passwords via configd s
A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved prior to 19.3R1.
cvelistv5nvd
CVE-2020-1623MEDIUMCVSS 5.5≥ unspecified, < 19.2R1-EVO2020-04-08
CVE-2020-1623 [MEDIUM] CWE-532 CVE-2020-1623: A local, authenticated user with shell can view sensitive configuration information via the ev.ops c
A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved prior to 19.2R1.
cvelistv5nvd
CVE-2020-1622MEDIUMCVSS 5.5≥ unspecified, < 19.1R1-EVO2020-04-08
CVE-2020-1622 [MEDIUM] CWE-664 CVE-2020-1622: A local, authenticated user with shell can obtain the hashed values of login passwords and shared se
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
cvelistv5nvd
CVE-2020-1621MEDIUMCVSS 5.5≥ unspecified, < 19.3R1-EVO2020-04-08
CVE-2020-1621 [MEDIUM] CWE-664 CVE-2020-1621: A local, authenticated user with shell can obtain the hashed values of login passwords via configd t
A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved prior to 19.3R1.
cvelistv5nvd