Juniper

Junos

720 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.62%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:06

On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in com...

  • EPSS 0.05%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:06

A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege...

  • EPSS 0.23%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:06

On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to funct...

  • EPSS 0.31%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:07

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to ...

  • EPSS 0.2%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:07

On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when multicast packets are received by the layer 2 inter...

  • EPSS 0.05%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:07

The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it c...

  • EPSS 0.21%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:07

On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. This specific packets can originate only from ...

  • EPSS 0.33%
  • Published 17.07.2020 19:15:14
  • Last modified 21.11.2024 05:11:05

When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon rece...

  • EPSS 0.39%
  • Published 17.07.2020 19:15:13
  • Last modified 21.11.2024 05:11:04

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE f...

  • EPSS 1.99%
  • Published 17.07.2020 19:15:13
  • Last modified 21.11.2024 05:11:04

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, a double free vulnerability can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) due to processing of a specific HTTP message. C...