Juniper

Junos

720 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.52%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:05

Specific IPv6 DHCP packets received by the jdhcpd daemon will cause a memory resource consumption issue to occur on a Junos OS device using the jdhcpd daemon configured to respond to IPv6 requests. Once started, memory consumption will eventually imp...

  • EPSS 0.49%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:05

A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS...

  • EPSS 0.04%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:05

When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Ad...

  • EPSS 0.26%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:05

When configuring a stateless firewall filter in Junos OS, terms named using the format "internal-n" (e.g. "internal-1", "internal-2", etc.) are silently ignored. No warning is issued during configuration, and the config is committed without error, bu...

  • EPSS 0.8%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:06

In a Dynamic Host Configuration Protocol version 6 (DHCPv6) environment, the jdhcpd daemon may crash and restart upon receipt of certain DHCPv6 solicit messages received from a DHCPv6 client. By continuously sending the same crafted packet, an attack...

  • EPSS 0.09%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:06

Crafted packets destined to the management interface (fxp0) of an SRX340 or SRX345 services gateway may create a denial of service (DoS) condition due to buffer space exhaustion. This issue only affects the SRX340 and SRX345 services gateways. No oth...

  • EPSS 0.29%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:06

If REST API is enabled, the Junos OS login credentials are vulnerable to brute force attacks. The high default connection limit of the REST API may allow an attacker to brute-force passwords using advanced scripting techniques. Additionally, administ...

  • EPSS 0.54%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:06

On Junos OS, rpcbind should only be listening to port 111 on the internal routing instance (IRI). External packets destined to port 111 should be dropped. Due to an information leak vulnerability, responses were being generated from the source addres...

  • EPSS 0.28%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:06

On EX4300-MP Series devices with any lo0 filters applied, transit network traffic may reach the control plane via loopback interface (lo0). The device may fail to forward such traffic. This issue affects Juniper Networks Junos OS 18.2 versions prior ...

  • EPSS 5.77%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to ...