CVE-2026-21921
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:28:29
- Zuletzt bearbeitet 23.01.2026 18:52:35
A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are fre...
CVE-2026-21911
- EPSS 0.02%
- Veröffentlicht 15.01.2026 20:23:54
- Zuletzt bearbeitet 23.01.2026 16:59:03
An Incorrect Calculation vulnerability in the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker flapping the management interface to cause the learning of new MACs ove...
CVE-2026-21909
- EPSS 0.02%
- Veröffentlicht 15.01.2026 20:22:44
- Zuletzt bearbeitet 23.01.2026 19:40:48
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker controlling an adjacent IS-IS neighbor to send a specific update...
CVE-2026-21908
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:21:41
- Zuletzt bearbeitet 23.01.2026 19:40:42
A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, lea...
CVE-2025-60011
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:16:47
- Zuletzt bearbeitet 23.01.2026 19:39:45
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an availability impact for downstr...
CVE-2025-60003
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:15:04
- Zuletzt bearbeitet 23.01.2026 19:39:25
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP upda...
CVE-2025-59961
- EPSS 0.01%
- Veröffentlicht 15.01.2026 20:14:43
- Zuletzt bearbeitet 23.01.2026 19:39:19
An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd pro...
CVE-2025-59960
- EPSS 0.03%
- Veröffentlicht 15.01.2026 20:14:00
- Zuletzt bearbeitet 23.01.2026 19:39:11
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to ...
CVE-2025-59959
- EPSS 0.01%
- Veröffentlicht 15.01.2026 20:13:21
- Zuletzt bearbeitet 23.01.2026 19:38:55
An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS). When the command 'sh...
CVE-2025-60010
- EPSS 0.04%
- Veröffentlicht 09.10.2025 16:20:28
- Zuletzt bearbeitet 23.01.2026 19:38:40
A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change. Affected devices allow logins ...