CVE-2020-1637
- EPSS 0.19%
- Published 08.04.2020 20:15:14
- Last modified 21.11.2024 05:11:03
A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Inf...
CVE-2020-1638
- EPSS 0.39%
- Published 08.04.2020 20:15:14
- Last modified 21.11.2024 05:11:03
The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plan...
CVE-2020-1639
- EPSS 0.54%
- Published 08.04.2020 20:15:14
- Last modified 21.11.2024 05:11:03
When an attacker sends a specific crafted Ethernet Operation, Administration, and Maintenance (Ethernet OAM) packet to a target device, it may improperly handle the incoming malformed data and fail to sanitize this incoming data resulting in an overf...
CVE-2020-1613
- EPSS 0.45%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:10:57
A vulnerability in the BGP FlowSpec implementation may cause a Juniper Networks Junos OS device to terminate an established BGP session upon receiving a specific BGP FlowSpec advertisement. The BGP NOTIFICATION message that terminates an established ...
- EPSS 0.39%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:10:58
A Use of Hard-coded Credentials vulnerability exists in the NFX250 Series for the vSRX Virtual Network Function (VNF) instance, which allows an attacker to take control of the vSRX VNF instance if they have the ability to access an administrative ser...
- EPSS 0.47%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:10:58
The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the ...
CVE-2020-1617
- EPSS 0.66%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:11:00
This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to this issue. An improper initialization of memory in ...
CVE-2020-1618
- EPSS 0.04%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:11:00
On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password. This issue might only occur in certain scenarios: • At the first reboot after performi...
CVE-2020-1619
- EPSS 0.04%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:11:00
A privilege escalation vulnerability in Juniper Networks QFX10K Series, EX9200 Series, MX Series, and PTX Series with Next-Generation Routing Engine (NG-RE), allows a local authenticated high privileged user to access the underlying WRL host. This is...
CVE-2020-1625
- EPSS 0.11%
- Published 08.04.2020 20:15:13
- Last modified 21.11.2024 05:11:01
The kernel memory usage represented as "temp" via 'show system virtual-memory' may constantly increase when Integrated Routing and Bridging (IRB) is configured with multiple underlay physical interfaces, and one interface flaps. This memory leak can ...