CVE-2026-21921
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:28:29
- Zuletzt bearbeitet 23.01.2026 18:52:35
A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are fre...
CVE-2026-21920
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:28:10
- Zuletzt bearbeitet 23.01.2026 18:51:59
An Unchecked Return Value vulnerability in the DNS module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an SRX Series device configured for DNS processing, rece...
CVE-2026-21918
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:27:54
- Zuletzt bearbeitet 23.01.2026 19:41:38
A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX and MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On all SRX and MX Series platforms, when during ...
CVE-2026-21917
- EPSS 0.12%
- Veröffentlicht 15.01.2026 20:27:11
- Zuletzt bearbeitet 23.01.2026 19:41:44
An Improper Validation of Syntactic Correctness of Input vulnerability in the Web-Filtering module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an SRX device conf...
CVE-2026-21914
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:25:35
- Zuletzt bearbeitet 23.01.2026 19:41:03
An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos). If an SRX Series device receives a specifically malformed GPRS Tunne...
CVE-2026-21913
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:25:03
- Zuletzt bearbeitet 23.01.2026 19:40:56
An Incorrect Initialization of Resource vulnerability in the Internal Device Manager (IDM) of Juniper Networks Junos OS on EX4000 models allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On EX4000 models with 48 p...
CVE-2026-21912
- EPSS 0.01%
- Veröffentlicht 15.01.2026 20:24:20
- Zuletzt bearbeitet 16.01.2026 15:55:12
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the method to collect FPC Ethernet firmware statistics of Juniper Networks Junos OS on MX10k Series allows a local, low-privileged attacker executing the 'show system firmware' CLI ...
CVE-2026-21910
- EPSS 0.02%
- Veröffentlicht 15.01.2026 20:23:29
- Zuletzt bearbeitet 16.01.2026 15:55:12
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on EX4k Series and QFX5k Series platforms allows an unauthenticated network-adjacent attacker flapping an interfa...
CVE-2026-21909
- EPSS 0.02%
- Veröffentlicht 15.01.2026 20:22:44
- Zuletzt bearbeitet 23.01.2026 19:40:48
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker controlling an adjacent IS-IS neighbor to send a specific update...
CVE-2026-21908
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:21:41
- Zuletzt bearbeitet 23.01.2026 19:40:42
A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, lea...