CVE-2026-33776
- EPSS 0.02%
- Veröffentlicht 09.04.2026 22:16:26
- Zuletzt bearbeitet 16.04.2026 18:46:10
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a local user with low privileges to read sensitive information. A local user with low privileges can execute the CLI command 'show mgd' with sp...
CVE-2026-33778
- EPSS 0.15%
- Veröffentlicht 09.04.2026 22:16:26
- Zuletzt bearbeitet 17.04.2026 17:23:59
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of...
CVE-2026-33779
- EPSS 0.03%
- Veröffentlicht 09.04.2026 22:16:26
- Zuletzt bearbeitet 17.04.2026 17:21:52
An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it....
CVE-2026-33780
- EPSS 0.02%
- Veröffentlicht 09.04.2026 22:16:26
- Zuletzt bearbeitet 17.04.2026 17:59:50
A Missing Release of Memory after Effective Lifetime vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a memory leak ultimately leading...
CVE-2026-21919
- EPSS 0.05%
- Veröffentlicht 09.04.2026 22:16:25
- Zuletzt bearbeitet 17.04.2026 18:04:47
An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane. When...
CVE-2026-33773
- EPSS 0.05%
- Veröffentlicht 09.04.2026 22:16:25
- Zuletzt bearbeitet 17.04.2026 17:56:54
An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to dow...
CVE-2026-33774
- EPSS 0.04%
- Veröffentlicht 09.04.2026 22:16:25
- Zuletzt bearbeitet 13.04.2026 15:02:27
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and acces...
CVE-2026-21916
- EPSS 0.01%
- Veröffentlicht 09.04.2026 22:16:24
- Zuletzt bearbeitet 17.04.2026 18:05:52
A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Networks Junos OS allows a local, authenticated attacker with low privileges to escalate their privileges to root which will lead to a complete compromise of the system. Wh...
CVE-2025-30650
- EPSS 0.02%
- Veröffentlicht 08.04.2026 17:26:35
- Zuletzt bearbeitet 13.04.2026 22:16:26
A Missing Authentication for Critical Function vulnerability in command processing of Juniper Networks Junos OS allows a privileged local attacker to gain access to Linux-based line cards as root. This issue affects systems running Junos OS using Li...
CVE-2026-21921
- EPSS 0.02%
- Veröffentlicht 15.01.2026 20:28:29
- Zuletzt bearbeitet 23.01.2026 18:52:35
A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are fre...