Juniper Networks Junos OS Evolved vulnerabilities

244 known vulnerabilities affecting juniper_networks/junos_os_evolved.

Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96

Vulnerabilities

Page 3 of 13
CVE-2025-21595HIGHCVSS 7.1fixed in 21.2R3-S7-EVO≥ 21.4-EVO, < 21.4R3-S4-EVO+3 more2025-04-09
CVE-2025-21595 [HIGH] CWE-401 CVE-2025-21595: A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine ( A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, in an EVPN-VXLAN scenario, when specific A
cvelistv5nvd
CVE-2025-30651HIGHCVSS 8.7fixed in 21.2R3-S9-EVO≥ 21.4-EVO, < 21.4R3-S10-EVO+4 more2025-04-09
CVE-2025-30651 [HIGH] CWE-805 CVE-2025-30651: A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Ju A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When an attacker sends a specific ICMPv6 packet to an interface with "protocols router-advertisement" configured, rpd cras
cvelistv5nvd
CVE-2025-21597MEDIUMCVSS 6.0fixed in 21.2R3-S6-EVO≥ 21.3-EVO, < 21.3R3-S5-EVO+5 more2025-04-09
CVE-2025-21597 [MEDIUM] CWE-754 CVE-2025-21597: An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rp An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when BGP rib-sharding and update-threading are configured, a
cvelistv5nvd
CVE-2025-30653MEDIUMCVSS 6.0fixed in 22.2R3-S4-EVO≥ 22.4-EVO, < 22.4R3-S2-EVO+2 more2025-04-09
CVE-2025-30653 [MEDIUM] CWE-825 CVE-2025-30653: An Expired Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Ju An Expired Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).On all Junos OS and Junos OS Evolved platforms, when an MPLS Label-Switched Path (LSP) is configured with node-link-protection and transport-clas
cvelistv5nvd
CVE-2025-30655MEDIUMCVSS 6.8fixed in 21.2R3-S9-EVO≥ 21.4-EVO, < 21.4R3-S8-EVO+4 more2025-04-09
CVE-2025-30655 [MEDIUM] CWE-754 CVE-2025-30655: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). When a specific "show bgp neighbor" CLI command is run, the rpd cpu utilization rises and eventually causes a crash a
cvelistv5nvd
CVE-2025-30654MEDIUMCVSS 6.8fixed in 21.4R3-S10-EVO≥ 22.2-EVO, < 22.2R3-S6-EVO+3 more2025-04-09
CVE-2025-30654 [MEDIUM] CWE-200 CVE-2025-30654: An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the User Interface (U An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged, authenticated attacker with access to the CLI to access sensitive information. Through the execution of a specific show mgd command, a user with limited permissions
cvelistv5nvd
CVE-2025-30652MEDIUMCVSS 6.8fixed in 21.2R3-S9-EVO≥ 21.4-EVO, < 21.4R3-S10-EVO+5 more2025-04-09
CVE-2025-30652 [MEDIUM] CWE-755 CVE-2025-30652: An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Jun An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS). When asregex-optimized is configured and a specific "show route as-path" CLI command is executed, the rpd
cvelistv5nvd
CVE-2024-39564HIGHCVSS 8.7≥ 22.4, < 22.4R3-S3-EVO2025-02-05
CVE-2024-39564 [HIGH] CWE-415 Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates m
cvelistv5
CVE-2025-21598HIGHCVSS 8.2≥ 21.4R3-S7-EVO, < 21.4R3-S9-EVO≥ 22.2R3-S4-EVO, < 22.2R3-S5-EVO+5 more2025-01-09
CVE-2025-21598 [HIGH] CWE-125 CVE-2025-21598: An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing prot An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd. This issue affects: Junos OS: * from 21.2R3-S8 before 21.2R3-S9, * from 2
cvelistv5nvd
CVE-2025-21599HIGHCVSS 8.7≥ 22.4-EVO, < 22.4R3-S5-EVO≥ 23.2-EVO, < 23.2R2-S2-EVO+2 more2025-01-09
CVE-2025-21599 [HIGH] CWE-401 CVE-2025-21599: A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service. Receipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaus
cvelistv5nvd
CVE-2025-21600HIGHCVSS 8.7≥ 21.4-EVO, < 21.4R3-S9-EVO≥ 22.2-EVO, < 22.2R3-S5-EVO+5 more2025-01-09
CVE-2025-21600 [HIGH] CWE-125 Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BG
cvelistv5
CVE-2025-21602HIGHCVSS 7.1≥ 21.4, < 21.4R3-S9-EVO≥ 22.2, < 22.2R3-S5-EVO+5 more2025-01-09
CVE-2025-21602 [HIGH] CWE-755 CVE-2025-21602: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet
cvelistv5nvd
CVE-2025-21593HIGHCVSS 7.1fixed in 21.2R3-S9-EVO≥ 21.4-EVO, < 21.4R3-S10-EVO+5 more2025-01-09
CVE-2025-21593 [HIGH] CWE-664 CVE-2025-21593: An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS). On devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet whi
cvelistv5nvd
CVE-2024-47491HIGHCVSS 8.2fixed in 21.4R3-S8-EVO≥ 22.2, < 22.2R3-S4-EVO+3 more2024-10-11
CVE-2024-47491 [HIGH] CWE-755 CVE-2024-47491: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). When a BGP UPDATE with malformed path attribute is received over an established BGP session, rpd crashes and restarts. C
cvelistv5nvd
CVE-2024-39547HIGHCVSS 8.7fixed in 21.4R3-S7-EVO≥ 22.2-EVO, < 22.2R3-S4-EVO+3 more2024-10-11
CVE-2024-39547 [HIGH] CWE-755 CVE-2024-39547: An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks J An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to cause a CPU-based Denial of Service (DoS). If specially crafted TCP traffic is received by the control p
cvelistv5nvd
CVE-2024-47490HIGHCVSS 7.7fixed in 21.4R3-S9-EVO≥ 22.2-EVO, < 22.2R3-S4-EVO+4 more2024-10-11
CVE-2024-47490 [HIGH] CWE-923 CVE-2024-47490: An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet F An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased consumption of resources, ultimately resulting in a Denial of Service (DoS). When specific transit MPLS
cvelistv5nvd
CVE-2024-47509HIGHCVSS 7.1≥ 21.4, < 21.4R2-EVO≥ 22.1, < 22.1R2-EVO2024-10-11
CVE-2024-47509 [HIGH] CWE-770 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #3 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #3 An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (D
cvelistv5
CVE-2024-47495HIGHCVSS 8.4fixed in 21.2R3-S8-EVO≥ 21.4-EVO, < 21.4R3-S8-EVO+5 more2024-10-11
CVE-2024-47495 [HIGH] CWE-639 CVE-2024-47495: An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated att An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This issue affects: Juniper Networks Junos OS Evolved with dual-REs: * All versions before 21.2R3-S8-EVO
cvelistv5nvd
CVE-2024-47502HIGHCVSS 8.7fixed in 21.4R3-S9-EVO≥ 22.2, < 22.2R3-S4-EVO+3 more2024-10-11
CVE-2024-47502 [HIGH] CWE-770 CVE-2024-47502: An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Netwo An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP sessions that are terminated is not cleared, which over time leads to an exhaustion of resources, preventing n
cvelistv5nvd
CVE-2024-47498HIGHCVSS 7.1fixed in 21.4R3-S8-EVO≥ 22.2-EVO, < 22.2R3-S5-EVO+2 more2024-10-11
CVE-2024-47498 [HIGH] CVE-2024-47498: An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to enforce limits on MAC learning and moves can be configured but do not take effect. This can lead to control plan
cvelistv5nvd