CVE-2021-31378
- EPSS 0.28%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:33
In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and...
CVE-2021-31379
- EPSS 0.35%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:33
An Incorrect Behavior Order vulnerability in the MAP-E automatic tunneling mechanism of Juniper Networks Junos OS allows an attacker to send certain malformed IPv4 or IPv6 packets to cause a Denial of Service (DoS) to the PFE on the device which is d...
- EPSS 0.22%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:34
On PTX1000 System, PTX10002-60C System, after upgrading to an affected release, a Race Condition vulnerability between the chassis daemon (chassisd) and firewall process (dfwd) of Juniper Networks Junos OS, may update the device's interfaces with inc...
CVE-2021-31383
- EPSS 0.46%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:34
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets process...
- EPSS 0.37%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:34
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrati...
CVE-2021-31385
- EPSS 0.71%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:34
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in J-Web of Juniper Networks Junos OS allows any low-privileged authenticated attacker to elevate their privileges to root. This issue affects: Juniper Ne...
CVE-2021-31386
- EPSS 0.15%
- Veröffentlicht 19.10.2021 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:05:34
A Protection Mechanism Failure vulnerability in the J-Web HTTP service of Juniper Networks Junos OS allows a remote unauthenticated attacker to perform Person-in-the-Middle (PitM) attacks against the device. This issue affects: Juniper Networks Junos...
CVE-2021-31369
- EPSS 0.27%
- Veröffentlicht 19.10.2021 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:05:31
On MX Series platforms with MS-MPC/MS-MIC, an Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated network attacker to cause a partial Denial of Service (DoS) with a high rate of sp...
CVE-2021-31370
- EPSS 0.08%
- Veröffentlicht 19.10.2021 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:05:32
An Incomplete List of Disallowed Inputs vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an adjacent unauthenticated attacker which sends a high rate of specific multicast traffic...
- EPSS 0.22%
- Veröffentlicht 19.10.2021 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:05:32
Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an QFX5000 Series switch, leaking configuration information such as hear...