CVE-2017-10620
- EPSS 0.17%
- Veröffentlicht 13.10.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device n...
CVE-2017-10621
- EPSS 0.35%
- Veröffentlicht 13.10.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A denial of service vulnerability in telnetd service on Juniper Networks Junos OS allows remote unauthenticated attackers to cause a denial of service. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D50; 14.1 p...
CVE-2017-2341
- EPSS 0.19%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privile...
CVE-2017-2342
- EPSS 0.11%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that...
- EPSS 3.1%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security rev...
CVE-2017-2344
- EPSS 0.06%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious exploitation of this issue may lead to a denial of service (kernel panic) or be leveraged as a privilege escalation through local code execution. The ...
CVE-2017-2345
- EPSS 4.33%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial d...
CVE-2017-2346
- EPSS 0.27%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
An MS-MPC or MS-MIC Service PIC may crash when large fragmented packets are passed through an Application Layer Gateway (ALG). Repeated crashes of the Service PC can result in an extended denial of service condition. The issue can be seen only if NAT...
CVE-2017-2347
- EPSS 0.61%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service conditi...
CVE-2017-2348
- EPSS 0.45%
- Veröffentlicht 17.07.2017 13:18:24
- Zuletzt bearbeitet 20.04.2025 01:37:25
The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP ser...