- EPSS 0.39%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:12
An improper interpretation conflict of certain data between certain software components within the Juniper Networks Junos OS devices does not allow certain traffic to pass through the device upon receipt from an ingress interface filtering certain sp...
CVE-2021-0208
- EPSS 0.17%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:12
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashe...
CVE-2020-1683
- EPSS 0.37%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
On Juniper Networks Junos OS devices, a specific SNMP OID poll causes a memory leak which over time leads to a kernel crash (vmcore). Prior to the kernel crash other processes might be impacted, such as failure to establish SSH connection to the devi...
CVE-2020-1684
- EPSS 0.39%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
On Juniper Networks SRX Series configured with application identification inspection enabled, receipt of specific HTTP traffic can cause high CPU load utilization, which could lead to traffic interruption. Application identification is enabled by def...
- EPSS 0.21%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
When configuring stateless firewall filters in Juniper Networks EX4600 and QFX 5000 Series devices using Virtual Extensible LAN protocol (VXLAN), the discard action will fail to discard traffic under certain conditions. Given a firewall filter config...
CVE-2020-1686
- EPSS 0.55%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine. An attacker can repeatedly send the offe...
CVE-2020-1687
- EPSS 0.08%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could ...
CVE-2020-1688
- EPSS 0.05%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:10
On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. E...
CVE-2020-1689
- EPSS 0.08%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:10
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not oc...
- EPSS 0.39%
- Veröffentlicht 16.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:07
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, result...