CVE-2018-0032
- EPSS 0.54%
- Veröffentlicht 11.07.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:23
The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specif...
CVE-2018-0034
- EPSS 0.61%
- Veröffentlicht 11.07.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:24
A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. This issue is limited to systems which receives IPv6 DHCP packe...
- EPSS 0.12%
- Veröffentlicht 11.07.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:24
QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended addition...
CVE-2018-0037
- EPSS 1.82%
- Veröffentlicht 11.07.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:24
Junos OS routing protocol daemon (RPD) process may crash and restart or may lead to remote code execution while processing specific BGP NOTIFICATION messages. By continuously sending crafted BGP NOTIFICATION messages, an attacker can repeatedly crash...
CVE-2018-0016
- EPSS 15.17%
- Veröffentlicht 11.04.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:21
Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP data...
CVE-2018-0017
- EPSS 0.49%
- Veröffentlicht 11.04.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:21
A vulnerability in the Network Address Translation - Protocol Translation (NAT-PT) feature of Junos OS on SRX series devices may allow a certain valid IPv6 packet to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extend...
CVE-2018-0018
- EPSS 0.21%
- Veröffentlicht 11.04.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:22
On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other in...
CVE-2018-0019
- EPSS 0.34%
- Veröffentlicht 11.04.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:22
A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can dis...
CVE-2018-0020
- EPSS 0.35%
- Veröffentlicht 11.04.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:22
Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. Receipt of a repeated malformed BGP UPDATEs can result in an extended denial of service condition for the device. Th...
CVE-2018-0021
- EPSS 0.17%
- Veröffentlicht 11.04.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:37:22
If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec ...