Juniper

Junos

720 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:26

A Denial of Service vulnerability in the SIP application layer gateway (ALG) component of Junos OS based platforms allows an attacker to crash MS-PIC, MS-MIC, MS-MPC, MS-DPC or SRX flow daemon (flowd) process. This issue affects Junos OS devices with...

  • EPSS 8.91%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:26

If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. There is no documented CLI command to enable this se...

  • EPSS 0.05%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:28

An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up. Affected releases ...

  • EPSS 0.19%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:28

On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to ...

  • EPSS 0.24%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:28

Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. The daemon automatically restarts without intervention, but a continuou...

  • EPSS 0.17%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:28

If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attemptin...

  • EPSS 0.34%
  • Published 10.10.2018 18:29:02
  • Last modified 21.11.2024 03:37:28

On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address ...

  • EPSS 1.93%
  • Published 10.10.2018 18:29:01
  • Last modified 21.11.2024 03:37:25

A vulnerability in the Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support can allow a network based unauthenticated attacker to cause a severe memory exhaustion condition on the device. This can have an adverse impact on the ...

  • EPSS 0.68%
  • Published 10.10.2018 18:29:00
  • Last modified 21.11.2024 03:37:25

Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attacker can repeatedly crash the RPD process causing a...

  • EPSS 0.42%
  • Published 10.10.2018 18:29:00
  • Last modified 21.11.2024 03:37:25

An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPassw...