- EPSS 0.27%
- Published 22.04.2021 20:15:08
- Last modified 21.11.2024 05:42:16
Due to an improper Initialization vulnerability on Juniper Networks Junos OS QFX5100-96S devices with QFX 5e Series image installed, ddos-protection configuration changes will not take effect beyond the default DDoS (Distributed Denial of Service) se...
CVE-2021-0235
- EPSS 0.05%
- Published 22.04.2021 20:15:08
- Last modified 21.11.2024 05:42:16
On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series devices using tenant services on Juniper Networks Junos OS, due to incorrect permission scheme assigned to tenant system administrators, a tenant system administrator m...
CVE-2021-0236
- EPSS 0.22%
- Published 22.04.2021 20:15:08
- Last modified 21.11.2024 05:42:16
Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configu...
CVE-2021-0237
- EPSS 0.08%
- Published 22.04.2021 20:15:08
- Last modified 21.11.2024 05:42:16
On Juniper Networks EX4300-MP Series, EX4600 Series, EX4650 Series, QFX5K Series deployed as a Virtual Chassis with a specific Layer 2 circuit configuration, Packet Forwarding Engine manager (FXPC) process may crash and restart upon receipt of specif...
CVE-2021-0238
- EPSS 0.05%
- Published 22.04.2021 20:15:08
- Last modified 21.11.2024 05:42:16
When a MX Series is configured as a Broadband Network Gateway (BNG) based on Layer 2 Tunneling Protocol (L2TP), executing certain CLI command may cause the system to run out of disk space, excessive disk usage may cause other complications. An admini...
CVE-2021-0240
- EPSS 0.11%
- Published 22.04.2021 20:15:08
- Last modified 21.11.2024 05:42:17
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, the Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash if a malformed DHCPv6 packet is received, resulting in a rest...
- EPSS 0.42%
- Published 15.01.2021 18:15:15
- Last modified 21.11.2024 05:42:12
An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session. This issue affects: Juniper...
CVE-2021-0211
- EPSS 0.39%
- Published 15.01.2021 18:15:15
- Last modified 21.11.2024 05:42:12
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route ...
CVE-2021-0215
- EPSS 0.11%
- Published 15.01.2021 18:15:15
- Last modified 21.11.2024 05:42:13
On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packe...
CVE-2021-0217
- EPSS 0.11%
- Published 15.01.2021 18:15:15
- Last modified 21.11.2024 05:42:13
A vulnerability in processing of certain DHCP packets from adjacent clients on EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP local/relay server configured may lead to exhaustion of DMA memory causing a Denial of Servic...