Juniper Networks Junos OS Evolved vulnerabilities

244 known vulnerabilities affecting juniper_networks/junos_os_evolved.

Total CVEs
244
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH146MEDIUM96

Vulnerabilities

Page 9 of 13
CVE-2023-22398MEDIUMCVSS 5.5≥ unspecified, < 20.4R3-S4-EVO≥ 21.1, < 21.1R2-EVO2023-01-13
CVE-2023-22398 [MEDIUM] CWE-824 CVE-2023-22398: An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Net An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). When an MPLS ping is performed on BGP LSPs, the RPD might crash. Repeated execution of this operation will lead to a su
cvelistv5nvd
CVE-2023-22406MEDIUMCVSS 6.5≥ unspecified, < 20.4R3-S4-EVO≥ 21.4, < 21.4R2-S1-EVO, 21.4R3-EVO+1 more2023-01-13
CVE-2023-22406 [MEDIUM] CWE-401 CVE-2023-22406: A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). In a segment-routing scenario with OSPF as IGP, when a peer interface continuously flaps, next-hop churn will happen and a continuous incre
cvelistv5nvd
CVE-2023-22402MEDIUMCVSS 5.9≥ 21.3, < 21.3R3-EVO≥ 21.4, < 21.4R2-EVO+2 more2023-01-13
CVE-2023-22402 [MEDIUM] CWE-416 CVE-2023-22402: A Use After Free vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthen A Use After Free vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). In a Non Stop Routing (NSR) scenario, an unexpected kernel restart might be observed if "bgp auto-discovery" is enabled and if there is a BGP neighbor flap of auto-discovery sessions
cvelistv5nvd
CVE-2023-22397MEDIUMCVSS 6.1≥ unspecified, < 20.4R3-S4-EVO≥ 21.3, < 21.3R3-S1-EVO+3 more2023-01-13
CVE-2023-22397 [MEDIUM] CWE-367 CVE-2023-22397: An Allocation of Resources Without Limits or Throttling weakness in the memory management of the Pac An Allocation of Resources Without Limits or Throttling weakness in the memory management of the Packet Forwarding Engine (PFE) on Juniper Networks Junos OS Evolved PTX10003 Series devices allows an adjacently located attacker who has established certain preconditions and knowledge of the environment to send certain specific genuine packets to begin
cvelistv5nvd
CVE-2022-22184HIGHCVSS 7.5≥ 22.3-EVO, < 22.3R1-S1-EVO2022-12-22
CVE-2022-22184 [HIGH] CWE-20 CVE-2022-22184: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). If a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, th
cvelistv5nvd
CVE-2022-22248HIGHCVSS 7.3≥ 20.4-EVO, < 20.4R3-S1-EVO≥ 21.1R1-EVO, < 21.1-EVO*+2 more2022-10-18
CVE-2022-22248 [HIGH] CWE-732 CVE-2022-22248: An Incorrect Permission Assignment vulnerability in shell processing of Juniper Networks Junos OS Ev An Incorrect Permission Assignment vulnerability in shell processing of Juniper Networks Junos OS Evolved allows a low-privileged local user to modify the contents of a configuration file which could cause another user to execute arbitrary commands within the context of the follow-on user's session. If the follow-on user is a high-privileged administr
cvelistv5nvd
CVE-2022-22211HIGHCVSS 7.5≥ unspecified, < 20.4R3-S4-EVO≥ 21.1R1-EVO, < 21.1-EVO*+4 more2022-10-18
CVE-2022-22211 [HIGH] CWE-770 CVE-2022-22211: A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged attacker to cause Denial of Service (DoS). Continuously polling the SNMP jnxCosQstatTable causes the FPC to run out of GUID space, causing a Denial of Service to the FPC resources. When the FPC runs out of the GUID sp
cvelistv5nvd
CVE-2022-22247HIGHCVSS 7.5≥ 21.3-EVO, < 21.3R3-EVO≥ 21.4-EVO, < 21.4R2-EVO+1 more2022-10-18
CVE-2022-22247 [HIGH] CWE-20 CVE-2022-22247: An Improper Input Validation vulnerability in ingress TCP segment processing of Juniper Networks Jun An Improper Input Validation vulnerability in ingress TCP segment processing of Juniper Networks Junos OS Evolved allows a network-based unauthenticated attacker to send a crafted TCP segment to the device, triggering a kernel panic, leading to a Denial of Service (DoS) condition. Continued receipt and processing of this TCP segment could create a sust
cvelistv5nvd
CVE-2022-22192HIGHCVSS 7.5≥ 20.4-EVO, < 20.4R3-S4-EVO≥ 21.3-EVO, < 21.3R3-EVO+2 more2022-10-18
CVE-2022-22192 [HIGH] CWE-1286 CVE-2022-22192: An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Netw An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an incoming TCP packet destined to the device is malformed there is a possibility of a kernel panic. Only TCP packets destined
cvelistv5nvd
CVE-2022-22239HIGHCVSS 8.8≥ unspecified, < 20.4R3-S5-EVO≥ 21.1-EVO, < 21.1R3-EVO+2 more2022-10-18
CVE-2022-22239 [HIGH] CWE-250 CVE-2022-22239: An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Network An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authenticated attacker with access to the ssh operational comma
cvelistv5nvd
CVE-2022-22230MEDIUMCVSS 6.5≥ unspecified, < 20.4R3-S5-EVO≥ 21.1-EVO, < 21.1R3-S2-EVO+5 more2022-10-18
CVE-2022-22230 [MEDIUM] CWE-20 CVE-2022-22230: An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause DoS (Denial of Service). If another router generates more than one specific valid OSPFv3 LSA then rpd will crash while processing these LSAs. This issue only affects syst
cvelistv5nvd
CVE-2022-22227MEDIUMCVSS 5.3≥ 21.1-EVO, < 21.1R3-S2-EVO≥ 21.2-EVO, < 21.2R3-S2-EVO+2 more2022-10-18
CVE-2022-22227 [MEDIUM] CWE-754 CVE-2022-22227: An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engin An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On receipt of specific IPv6 transit traffic, Junos OS Evolved on ACX7100-48L, ACX7100-32C and A
cvelistv5nvd
CVE-2022-22250MEDIUMCVSS 6.5≥ unspecified, < 20.4R3-S3-EVO≥ 21.1R1-EVO, < 21.1-EVO*+3 more2022-10-18
CVE-2022-22250 [MEDIUM] CWE-664 CVE-2022-22250: An Improper Control of a Resource Through its Lifetime vulnerability in Packet Forwarding Engine (PF An Improper Control of a Resource Through its Lifetime vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows unauthenticated adjacent attacker to cause a Denial of Service (DoS). In an EVPN-MPLS scenario, if MAC is learned locally on an access interface but later a request to delete is received indi
cvelistv5nvd
CVE-2022-22224MEDIUMCVSS 6.5≥ unspecified, < 20.4R3-S3-EVO≥ 21.1, < 21.1R2-EVO2022-10-18
CVE-2022-22224 [MEDIUM] CWE-703 CVE-2022-22224: An Improper Check or Handling of Exceptional Conditions vulnerability in the processing of a malform An Improper Check or Handling of Exceptional Conditions vulnerability in the processing of a malformed OSPF TLV in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause the periodic packet management daemon (PPMD) process to go into an infinite loop, which in turn can cause protocols and functions relian
cvelistv5nvd
CVE-2022-22219MEDIUMCVSS 5.9≥ 21.3R1-EVO, < 21.3*≥ 21.4, < 21.4R3-EVO+2 more2022-10-18
CVE-2022-22219 [MEDIUM] CWE-241 CVE-2022-22219: Due to the Improper Handling of an Unexpected Data Type in the processing of EVPN routes on Juniper Due to the Improper Handling of an Unexpected Data Type in the processing of EVPN routes on Juniper Networks Junos OS and Junos OS Evolved, an attacker in direct control of a BGP client connected to a route reflector, or via a machine in the middle (MITM) attack, can send a specific EVPN route contained within a BGP Update, triggering a routing proto
cvelistv5nvd
CVE-2022-22240MEDIUMCVSS 5.5≥ unspecified, < 20.4R3-S1-EVO≥ 21.1R1-EVO, < 21.1-EVO*+2 more2022-10-18
CVE-2022-22240 [MEDIUM] CWE-401 CVE-2022-22240: An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effect An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with r
cvelistv5nvd
CVE-2022-22238MEDIUMCVSS 6.5≥ unspecified, < 20.2R3-S3-EVO≥ 20.3R1-EVO, < 20.3-EVO*+4 more2022-10-18
CVE-2022-22238 [MEDIUM] CWE-754 CVE-2022-22238: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When an incoming RESV message corresponding to a protected LSP is malformed it causes an incorrect internal state
cvelistv5nvd
CVE-2022-22208MEDIUMCVSS 5.9≥ unspecified, < 20.4R3-S4-EVO≥ 21.1-EVO, < 21.1R3-S2-EVO+2 more2022-10-18
CVE-2022-22208 [MEDIUM] CWE-416 CVE-2022-22208: A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service (DoS). When a BGP session flap happens, a Use After Free of a memory location that was assigned to another object can occur, which will lead to an rpd crash.
cvelistv5nvd
CVE-2022-22220MEDIUMCVSS 5.9≥ unspecified, < 20.4R2-EVO≥ 21.1-EVO, < 21.1R2-EVO2022-10-18
CVE-2022-22220 [MEDIUM] CWE-367 CVE-2022-22220: A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) o A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, Junos OS Evolved allows a network-based unauthenticated attacker to cause a Denial of Service (DoS). When a BGP flow route with redirect IP extended community is received, and the reachability to the next-hop of the corres
cvelistv5nvd
CVE-2022-22225MEDIUMCVSS 5.9≥ unspecified, < 20.4R3-S4-EVO≥ 21.1R1-EVO, < 21.1-EVO*+2 more2022-10-18
CVE-2022-22225 [MEDIUM] CWE-367 CVE-2022-22225: A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the Routing Protocol Daemon (rp A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker with an established BGP session to cause a Denial of Service (DoS). In a BGP multipath scenario, when one of the contributing routes is flapping often and rapidly,
cvelistv5nvd