Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:17

A vulnerability due to the improper handling of direct memory access (DMA) buffers on EX4300 switches on Juniper Networks Junos OS allows an attacker sending specific unicast frames to trigger a Denial of Service (DoS) condition by exhausting DMA buf...

  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:17

Improper Handling of Unexpected Data in the firewall policer of Juniper Networks Junos OS on EX4300 switches allows matching traffic to exceed set policer limits, possibly leading to a limited Denial of Service (DoS) condition. When the firewall poli...

  • EPSS 0.21%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which may allow an attacker to bypass the storm-control...

  • EPSS 0.04%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

A Use of Hard-coded Credentials vulnerability in Juniper Networks Junos OS on Junos Fusion satellite devices allows an attacker who is local to the device to elevate their privileges and take control of the device. This issue affects: Juniper Network...

  • EPSS 0.04%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, devices using tenant services on Juniper Networks Junos OS, due to incorrect default permissions assigned to tenant system administrators a tenant system administrator may inadvert...

  • EPSS 0.23%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback fi...

  • EPSS 0.42%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Credentials in Juniper Networks Junos OS allows an attacker to take over any instance of an NFX deployment. This issue is only exploitable through admin...

  • EPSS 0.42%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwis...

  • EPSS 0.39%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific craf...

  • EPSS 0.39%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:19

A NULL Pointer Dereference vulnerability in the Captive Portal Content Delivery (CPCD) services daemon (cpcd) of Juniper Networks Junos OS on MX Series with MS-PIC, MS-SPC3, MS-MIC or MS-MPC allows an attacker to send malformed HTTP packets to the de...