Juniper Networks Junos OS Evolved vulnerabilities

244 known vulnerabilities affecting juniper_networks/junos_os_evolved.

Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96

Vulnerabilities

Page 5 of 13
CVE-2024-39535HIGHCVSS 7.1≥ 22.4R2-S1-EVO, < 22.4R3-EVO2024-07-11
CVE-2024-39535 [HIGH] CWE-754 CVE-2024-39535: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engin An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When a device has a Layer 3 or an IRB interface configured in a VPLS instance and specific traffic is recei
cvelistv5nvd
CVE-2024-39523HIGHCVSS 8.5fixed in 20.4R3-S7-EVO≥ 21.2-EVO, < 21.2R3-S8-EVO+5 more2024-07-11
CVE-2024-39523 [HIGH] CWE-78 CVE-2024-39523: An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved co An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which exe
cvelistv5nvd
CVE-2024-39552HIGHCVSS 8.7fixed in 21.2R3-S7-EVO≥ 21.3-EVO, < 21.3R3-S5-EVO+7 more2024-07-11
CVE-2024-39552 [HIGH] CWE-755 CVE-2024-39552: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, RPD
cvelistv5nvd
CVE-2024-39520HIGHCVSS 8.5fixed in 20.4R3-S6-EVO≥ 21.2-EVO, < 21.2R3-S4-EVO+3 more2024-07-11
CVE-2024-39520 [HIGH] CWE-78 CVE-2024-39520: An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved co An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which exe
cvelistv5nvd
CVE-2024-39519HIGHCVSS 7.1v22.1-EVOv22.2-EVO+2 more2024-07-11
CVE-2024-39519 [HIGH] CWE-754 CVE-2024-39519: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engin An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). On all ACX 7000 Series platforms running Junos OS Evolved, and configured with IRBs, if a Customer Edge de
cvelistv5nvd
CVE-2024-39524HIGHCVSS 8.5fixed in 20.4R3-S7-EVO≥ 21.2-EVO, < 21.2R3-S8-EVO+4 more2024-07-11
CVE-2024-39524 [HIGH] CWE-78 CVE-2024-39524: An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved co An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which exe
cvelistv5nvd
CVE-2024-39548HIGHCVSS 7.1fixed in 21.2R3-S8-EVO≥ 21.3, < 21.3R3-S5-EVO+6 more2024-07-11
CVE-2024-39548 [HIGH] CWE-400 CVE-2024-39548: An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted. This issue affects both IPv4 and IPv6.
cvelistv5nvd
CVE-2024-39532MEDIUMCVSS 6.3fixed in 22.1R3-EVO≥ 22.2-EVO, < 22.2R2-S1-EVO, 22.2R3-EVO+1 more2024-07-11
CVE-2024-39532 [MEDIUM] CWE-532 CVE-2024-39532: An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and J An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privile
cvelistv5nvd
CVE-2024-39528MEDIUMCVSS 6.0fixed in 21.2R3-S8-EVO≥ 21.4-EVO, < 21.4R3-S5-EVO+4 more2024-07-11
CVE-2024-39528 [MEDIUM] CWE-416 CVE-2024-39528: A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a routing-instance deactivation is triggered, and at the same time a specific SNMP request is received
cvelistv5nvd
CVE-2024-39536MEDIUMCVSS 6.0≥ 21.2-EVO, < 21.2R3-S8-EVO≥ 21.4-EVO, < 21.4R3-S7-EVO+4 more2024-07-11
CVE-2024-39536 [MEDIUM] CWE-401 CVE-2024-39536: A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). When a BFD session configured with authentication flaps, ppmd memory can leak. Whether the leak happens
cvelistv5nvd
CVE-2024-39537MEDIUMCVSS 6.9fixed in 21.4R3-S7-EVO≥ 22.2-EVO, < 22.2R3-S4-EVO+4 more2024-07-11
CVE-2024-39537 [MEDIUM] CWE-923 CVE-2024-39537: An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Netw An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network-based attacker to cause a limited information disclosure and availability impact to the device. Due to a wrong initialization, specific processes which should only be able t
cvelistv5nvd
CVE-2024-39553MEDIUMCVSS 6.9≥ 21.4-EVO, < 21.4R3-S7-EVO≥ 22.2-EVO, < 22.2R3-S3-EVO+3 more2024-07-11
CVE-2024-39553 [MEDIUM] CWE-668 CVE-2024-39553: An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Ju An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited availability impacting Denial of Service (DoS) and allows unauthorized network access to the device,
cvelistv5nvd
CVE-2024-39559HIGHCVSS 8.2fixed in 21.2R3-S8-EVO≥ 21.4-EVO, < 21.4R3-S6-EVO+4 more2024-07-10
CVE-2024-39559 [HIGH] CWE-754 CVE-2024-39559: An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Junipe An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication enabled, destined to an accessible port on the device, r
cvelistv5nvd
CVE-2024-39557HIGHCVSS 7.1fixed in 21.4R3-S8-EVO≥ 22.2-EVO, < 22.2R3-S4-EVO+3 more2024-07-10
CVE-2024-39557 [HIGH] CWE-400 CVE-2024-39557: An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS). Certain MAC table updates cause a small amount of m
cvelistv5nvd
CVE-2024-39558HIGHCVSS 7.1fixed in 20.4R3-S10-EVO≥ 21.2R1-EVO, < 21.2*-EVO+5 more2024-07-10
CVE-2024-39558 [HIGH] CWE-252 CVE-2024-39558: An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Jun An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS), when PIM is configured with Multicast-only Fast Re
cvelistv5nvd
CVE-2024-39562HIGHCVSS 8.7fixed in 21.4R3-S7-EVO≥ 22.3-EVO, < 22.3R2-S2-EVO, 22.3R3-S2-EVO+2 more2024-07-10
CVE-2024-39562 [HIGH] CWE-772 CVE-2024-39562: A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitimate users. Continued receipt of these connections will
cvelistv5nvd
CVE-2024-39517HIGHCVSS 7.1fixed in 21.2R3-S8-EVO≥ 21.4-EVO, < 21.4R3-S7-EVO+6 more2024-07-10
CVE-2024-39517 [HIGH] CWE-754 CVE-2024-39517: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learnin An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can
cvelistv5nvd
CVE-2024-39555HIGHCVSS 8.7fixed in 21.4R3-S8-EVO≥ 22.2-EVO, < 22.2R3-S4-EVO+4 more2024-07-10
CVE-2024-39555 [HIGH] CWE-755 CVE-2024-39555: An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued receipt and processing of these malformed BGP update mess
cvelistv5nvd
CVE-2024-39554HIGHCVSS 8.2≥ 21.1-EVO, < 21.1*-EVO≥ 21.2-EVO, < 21.2*-EVO+6 more2024-07-10
CVE-2024-39554 [HIGH] CWE-362 CVE-2024-39554: A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulner A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates when BGP multipath is enabled, causing rpd to crash an
cvelistv5nvd
CVE-2024-39512HIGHCVSS 7.0≥ 23.2R2-EVO, < 23.2R2-S1-EVO≥ 23.4R1-EVO, < 23.4R2-EVO2024-07-10
CVE-2024-39512 [HIGH] CWE-1263 CVE-2024-39512: An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Ju An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to
cvelistv5nvd