- EPSS 0.3%
- Veröffentlicht 16.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:08
On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malform...
CVE-2020-1682
- EPSS 0.05%
- Veröffentlicht 16.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:09
An input validation vulnerability exists in Juniper Networks Junos OS, allowing an attacker to crash the srxpfe process, causing a Denial of Service (DoS) through the use of specific maintenance commands. The srxpfe process restarts automatically, bu...
CVE-2020-1656
- EPSS 0.45%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a spe...
- EPSS 0.39%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to s...
CVE-2020-1660
- EPSS 0.29%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing...
CVE-2020-1661
- EPSS 0.27%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet. This issue only affects devices configured as DHC...
CVE-2020-1662
- EPSS 0.39%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in com...
CVE-2020-1664
- EPSS 0.05%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege...
- EPSS 0.23%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:06
On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to funct...
- EPSS 0.31%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:07
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to ...