CVE-2021-0223
- EPSS 0.04%
- Veröffentlicht 15.01.2021 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:42:14
A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS may allow a locally authenticated shell user to escalate privileges and execute arbitrary commands as root. telnetd.real is shipped with setuid permissions enable...
- EPSS 0.39%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:11
On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network even...
CVE-2021-0203
- EPSS 0.39%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:11
On Juniper Networks EX and QFX5K Series platforms configured with Redundant Trunk Group (RTG), Storm Control profile applied on the RTG interface might not take affect when it reaches the threshold condition. Storm Control enables the device to monit...
CVE-2021-0204
- EPSS 0.03%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:11
A sensitive information disclosure vulnerability in delta-export configuration utility (dexp) of Juniper Networks Junos OS may allow a locally authenticated shell user the ability to create and read database files generated by the dexp utility, inclu...
CVE-2021-0205
- EPSS 0.23%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:11
When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpecte...
- EPSS 0.39%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:12
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to send a specific packet causing the packet forwarding engine (PFE) to crash and restart, resulting in a Denial of Service (DoS). By continuously sending these ...
- EPSS 0.39%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:12
An improper interpretation conflict of certain data between certain software components within the Juniper Networks Junos OS devices does not allow certain traffic to pass through the device upon receipt from an ingress interface filtering certain sp...
CVE-2021-0208
- EPSS 0.17%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:12
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashe...
CVE-2020-1683
- EPSS 0.37%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
On Juniper Networks Junos OS devices, a specific SNMP OID poll causes a memory leak which over time leads to a kernel crash (vmcore). Prior to the kernel crash other processes might be impacted, such as failure to establish SSH connection to the devi...
CVE-2020-1684
- EPSS 0.39%
- Veröffentlicht 16.10.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:09
On Juniper Networks SRX Series configured with application identification inspection enabled, receipt of specific HTTP traffic can cause high CPU load utilization, which could lead to traffic interruption. Application identification is enabled by def...