Juniper

Junos

720 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks J...

  • EPSS 1.72%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. Affecte...

  • EPSS 0.3%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RP...

  • EPSS 0.39%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process t...

  • EPSS 0.17%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device n...

  • EPSS 0.35%
  • Published 13.10.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

A denial of service vulnerability in telnetd service on Juniper Networks Junos OS allows remote unauthenticated attackers to cause a denial of service. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D50; 14.1 p...

  • EPSS 0.19%
  • Published 17.07.2017 13:18:24
  • Last modified 20.04.2025 01:37:25

An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privile...

  • EPSS 0.11%
  • Published 17.07.2017 13:18:24
  • Last modified 20.04.2025 01:37:25

MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that...

  • EPSS 3.1%
  • Published 17.07.2017 13:18:24
  • Last modified 20.04.2025 01:37:25

The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security rev...

  • EPSS 0.06%
  • Published 17.07.2017 13:18:24
  • Last modified 20.04.2025 01:37:25

A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious exploitation of this issue may lead to a denial of service (kernel panic) or be leveraged as a privilege escalation through local code execution. The ...