Juniper Networks Junos OS Evolved vulnerabilities

244 known vulnerabilities affecting juniper_networks/junos_os_evolved.

Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96

Vulnerabilities

Page 13 of 13
CVE-2020-1624MEDIUMCVSS 5.5≥ unspecified, < 19.1R1-EVO2020-04-08
CVE-2020-1624 [MEDIUM] CWE-532 CVE-2020-1624: A local, authenticated user with shell can obtain the hashed values of login passwords and shared se A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
cvelistv5nvd
CVE-2020-1605HIGHCVSS 8.8≥ unspecified, < 19.3R12020-01-15
CVE-2020-1605 [HIGH] CWE-78 CVE-2020-1605: When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily execute commands as root on the target device. This issue affects IPv4 JDHCPD services. This issue affects: J
cvelistv5nvd
CVE-2020-1602HIGHCVSS 8.8≥ unspecified, < 19.3R12020-01-15
CVE-2020-1602 [HIGH] CWE-416 CVE-2020-1602: When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over the code execution of the JDHDCP process. This issue affect IPv4 JDHCPD services. This issue affects: Juni
cvelistv5nvd
CVE-2020-1609HIGHCVSS 8.8≥ unspecified, < 19.3R12020-01-15
CVE-2020-1609 [HIGH] CWE-78 CVE-2020-1609: When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on the target device. This issue affects IPv6 JDHCPD services. This issue affects: J
cvelistv5nvd