Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 09.04.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:02

Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This c...

  • EPSS 0.39%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:01

A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot fo...

  • EPSS 0.38%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:01

Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, ...

  • EPSS 0.31%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:02

A race condition vulnerability on Juniper Network Junos OS devices may cause the routing protocol daemon (RPD) process to crash and restart while processing a BGP NOTIFICATION message. This issue affects Juniper Networks Junos OS: 16.1 versions prior...

  • EPSS 0.03%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:02

A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to per...

  • EPSS 0.54%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:02

On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. ...

  • EPSS 0.19%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:03

A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Inf...

  • EPSS 0.39%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:03

The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plan...

  • EPSS 0.54%
  • Veröffentlicht 08.04.2020 20:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:03

When an attacker sends a specific crafted Ethernet Operation, Administration, and Maintenance (Ethernet OAM) packet to a target device, it may improperly handle the incoming malformed data and fail to sanitize this incoming data resulting in an overf...

  • EPSS 0.45%
  • Veröffentlicht 08.04.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:10:57

A vulnerability in the BGP FlowSpec implementation may cause a Juniper Networks Junos OS device to terminate an established BGP session upon receiving a specific BGP FlowSpec advertisement. The BGP NOTIFICATION message that terminates an established ...