CVE-2022-22156
- EPSS 0.12%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:16
An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an attacker to perform Person-in-the-Middle (PitM) attacks when a system script is fetched from a remote source at a specified HTTPS URL, which may compromise the int...
CVE-2022-22157
- EPSS 0.24%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:16
A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is ...
CVE-2022-22159
- EPSS 0.54%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:16
A vulnerability in the NETISR network queue functionality of Juniper Networks Junos OS kernel allows an attacker to cause a Denial of Service (DoS) by sending crafted genuine packets to a device. During an attack, the routing protocol daemon (rpd) CP...
CVE-2022-22160
- EPSS 0.2%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:16
An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS). In a subscriber management / bro...
CVE-2022-22161
- EPSS 0.98%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:17
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-ba...
CVE-2022-22162
- EPSS 0.04%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:17
A Generation of Error Message Containing Sensitive Information vulnerability in the CLI of Juniper Networks Junos OS allows a locally authenticated attacker with low privileges to elevate these to the level of any other user logged in via J-Web at th...
CVE-2022-22163
- EPSS 0.08%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:17
An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If a device is configured as DHC...
CVE-2022-22166
- EPSS 0.2%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:17
An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS). If a BGP u...
CVE-2022-22167
- EPSS 0.26%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:18
A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is ...
CVE-2022-22168
- EPSS 0.08%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:18
An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to trigger a Missing Release of Memory after Effective Lifetime vulnerability. Continued exploitati...