Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 11.25%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:21

Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP data...

  • EPSS 0.49%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:21

A vulnerability in the Network Address Translation - Protocol Translation (NAT-PT) feature of Junos OS on SRX series devices may allow a certain valid IPv6 packet to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extend...

  • EPSS 0.27%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:22

On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other in...

  • EPSS 0.34%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:22

A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can dis...

  • EPSS 0.35%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:22

Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. Receipt of a repeated malformed BGP UPDATEs can result in an extended denial of service condition for the device. Th...

  • EPSS 0.16%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:22

If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec ...

  • EPSS 1.35%
  • Veröffentlicht 11.04.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:22

A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform depen...

  • EPSS 0.22%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to...

  • EPSS 0.29%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the devic...

  • EPSS 0.22%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forward traffic instead of dropping traffic. This can lead to denials of services or other unintended conditions. Affected releases are Juniper Networks Ju...