Juniper Networks Junos OS Evolved vulnerabilities
244 known vulnerabilities affecting juniper_networks/junos_os_evolved.
Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96
Vulnerabilities
Page 6 of 13
CVE-2024-39556HIGHCVSS 7.1fixed in 21.4R3-S7-EVO≥ 22.1-EVO, < 22.1R3-S6-EVO+5 more2024-07-10
CVE-2024-39556 [HIGH] CWE-121 CVE-2024-39556: A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution.
By exploiting the 'set security certificates' comma
cvelistv5nvd
CVE-2024-39514HIGHCVSS 7.1fixed in 20.4R3-S10-EVO≥ 21.4-EVO, < 21.4R3-S6-EVO+5 more2024-07-10
CVE-2024-39514 [HIGH] CWE-703 CVE-2024-39514: An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon
An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
An attacker can send specific traffic to the device, which causes the rpd to crash and restart. Continued receipt of
cvelistv5nvd
CVE-2024-39560HIGHCVSS 7.1fixed in 21.4R3-S5-EVO≥ 22.1-EVO, < 22.1R3-S5-EVO+4 more2024-07-10
CVE-2024-39560 [HIGH] CWE-755 CVE-2024-39560: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).
The kernel memory leak and eventual crash will be
cvelistv5nvd
CVE-2024-39513MEDIUMCVSS 6.8fixed in 20.4R3-S9-EVO≥ 21.2-EVO, < 21.2R3-S7-EVO+7 more2024-07-10
CVE-2024-39513 [MEDIUM] CWE-20 CVE-2024-39513: An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks
An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS).
When a specific "clear" command is run, the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) crashes and restarts.
The crash impacts a
cvelistv5nvd
CVE-2024-30380HIGHCVSS 7.1fixed in 21.2R3-S7-EVO≥ 21.3, < 21.3R3-S5-EVO+6 more2024-04-16
CVE-2024-30380 [HIGH] CWE-755 CVE-2024-30380: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV.
The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP,
cvelistv5nvd
CVE-2024-30382HIGHCVSS 8.7fixed in 21.2R3-S8-EVO≥ 21.3, < 21.3R3-EVO+2 more2024-04-12
CVE-2024-30382 [HIGH] CWE-755 CVE-2024-30382: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS).
This issue can only be triggered whe
cvelistv5nvd
CVE-2024-30394HIGHCVSS 8.7fixed in 21.4R3-S5-EVO≥ 22.1-EVO, < 22.1R3-S4-EVO+4 more2024-04-12
CVE-2024-30394 [HIGH] CWE-121 CVE-2024-30394: A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos
A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS).
On all Junos OS and Junos OS Evolved platforms, when EVPN is configured, and a specific EVPN type-5 route is received vi
cvelistv5nvd
CVE-2024-30395HIGHCVSS 8.7fixed in 21.2R3-S7-EVO≥ 21.3-EVO, < 21.3R3-S5-EVO+5 more2024-04-12
CVE-2024-30395 [HIGH] CWE-1287 CVE-2024-30395: An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of
An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).
If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed
cvelistv5nvd
CVE-2024-30403HIGHCVSS 7.1≥ 23.2-EVO, < 23.2R1-S1-EVO, 23.2R2-EVO2024-04-12
CVE-2024-30403 [HIGH] CWE-476 CVE-2024-30403: A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks J
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
When Layer 2 traffic is sent through a logical interface, MAC learning happens. If during this process, the interface flaps, an Advanced Forwarding Toolkit
cvelistv5nvd
CVE-2024-30402HIGHCVSS 8.2≥ 21.4-EVO, < 21.4R3-S5-EVO≥ 22.1-EVO, < 22.1R3-S4-EVO+4 more2024-04-12
CVE-2024-30402 [HIGH] CWE-754 CVE-2024-30402: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learnin
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
When telemetry requests are sent to the device, and the Dynamic Rendering Daemon (drend) is suspended, t
cvelistv5nvd
CVE-2024-30386HIGHCVSS 7.1fixed in 20.4R3-S8-EVO≥ 21.2-EVO, < 21.2R3-S6-EVO+6 more2024-04-12
CVE-2024-30386 [HIGH] CWE-416 CVE-2024-30386: A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald)
of Juniper Networks
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald)
of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS).
In an EVPN-VXLAN scenario, when
state updates are received and processed by the affected system, the correct order o
cvelistv5nvd
CVE-2024-21590HIGHCVSS 7.1fixed in 21.2R3-S8-EVO≥ 21.4-EVO, < 21.4R3-S6-EVO+5 more2024-04-12
CVE-2024-21590 [HIGH] CWE-20 CVE-2024-21590: An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper
An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper Networks Junos OS Evolved allows an unauthenticated attacker within the MPLS administrative domain to send specifically crafted packets to the Routing Engine (RE) to cause a Denial of Service (DoS).
When specifically crafted transit MPLS IPv4 packets a
cvelistv5nvd
CVE-2024-21598HIGHCVSS 8.7≥ 20.4-EVO, < 20.4R3-S9-EVO≥ 21.2-EVO, < 21.2R3-S7-EVO+7 more2024-04-12
CVE-2024-21598 [HIGH] CWE-1286 CVE-2024-21598: An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemo
An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
If a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute
cvelistv5nvd
CVE-2024-21618HIGHCVSS 7.1≥ 21.4-EVO, < 21.4R3-S5-EVO≥ 22.1-EVO, < 22.1R3-S4-EVO+4 more2024-04-12
CVE-2024-21618 [HIGH] CWE-788 CVE-2024-21618: An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daem
An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause Denial of Service (DoS).
On all Junos OS and Junos OS Evolved platforms, when LLDP is enabled on a specific interface, and a malformed LL
cvelistv5nvd
CVE-2024-30390MEDIUMCVSS 6.9fixed in 21.4R3-S4-EVO≥ 22.1-EVO, < 22.1R3-S3-EVO+2 more2024-04-12
CVE-2024-30390 [MEDIUM] CWE-307 CVE-2024-30390: An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos
An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane.
When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't co
cvelistv5nvd
CVE-2024-30406MEDIUMCVSS 6.7≥ 23.1R1-EVO, ≤ 23.2R2-EVO2024-04-12
CVE-2024-30406 [MEDIUM] CWE-313 CVE-2024-30406: A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series
A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials.
This issue affects only Juniper Networks Junos OS Evolve
cvelistv5nvd
CVE-2024-30409MEDIUMCVSS 6.9≥ 22.1-EVO, < 22.1R1-S2-EVO, 22.1R2-EVO2024-04-12
CVE-2024-30409 [MEDIUM] CWE-754 CVE-2024-30409: An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Jun
An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (fibtd) to crash, leading to a limited Denial of Service.
This issue affects Juniper Networks
Junos O
cvelistv5nvd
CVE-2024-21615MEDIUMCVSS 5.1fixed in 21.2R3-S7-EVO≥ 21.3-EVO, < 21.3R3-S5-EVO+6 more2024-04-12
CVE-2024-21615 [MEDIUM] CWE-276 CVE-2024-21615: An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved all
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system.
On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configured, and a super-user performs specific actions via NETCONF, then a low-privil
cvelistv5nvd
CVE-2024-21611HIGHCVSS 7.5≥ 21.4-EVO, < 21.4R3-EVO≥ 22.1-EVO, < 22.1R3-EVO+1 more2024-01-12
CVE-2024-21611 [HIGH] CWE-401 CVE-2024-21611:
A Missing Release of Memory after Effective Lifetime vulnerability in the Routing Protocol Daemon (
A Missing Release of Memory after Effective Lifetime vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
In a Juniper Flow Monitoring (jflow) scenario route churn that causes BGP next hops to be updated will cause a s
cvelistv5nvd
CVE-2024-21604HIGHCVSS 7.5fixed in 20.4R3-S7-EVO≥ 21.2-EVO, < 21.2*-EVO+5 more2024-01-12
CVE-2024-21604 [HIGH] CWE-770 CVE-2024-21604:
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Netw
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
If a high rate of specific valid packets are processed by the routing engine (RE) this will lead to a loss of connectivity of the RE with other c
cvelistv5nvd