Juniper

Junos

775 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Juniper Networks Junos OS 16.1R1, and services releases based off of 16.1R1, are vulnerable to the receipt of a crafted BGP Protocol Data Unit (PDU) sent directly to the router, which can cause the RPD routing process to crash and restart. Unlike BGP...

  • EPSS 0.39%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a ...

  • EPSS 0.37%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This i...

  • EPSS 0.25%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated cras...

  • EPSS 0.05%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions ...

  • EPSS 0.36%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks J...

  • EPSS 1.72%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. Affecte...

  • EPSS 0.3%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RP...

  • EPSS 0.39%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process t...

  • EPSS 0.17%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device n...