CVE-2021-0291
- EPSS 0.29%
- Veröffentlicht 15.07.2021 20:15:10
- Zuletzt bearbeitet 21.11.2024 05:42:25
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which pa...
- EPSS 0.27%
- Veröffentlicht 22.04.2021 20:15:10
- Zuletzt bearbeitet 21.11.2024 05:42:22
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to ...
- EPSS 0.39%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:18
In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific craf...
CVE-2021-0259
- EPSS 0.11%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:20
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-pro...
CVE-2021-0264
- EPSS 0.24%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:21
A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and...
CVE-2021-0225
- EPSS 0.19%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:14
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An admin...
CVE-2021-0226
- EPSS 0.54%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:14
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustai...
CVE-2021-0236
- EPSS 0.22%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:16
Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configu...
CVE-2021-0239
- EPSS 0.2%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:16
In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations wi...
CVE-2021-0209
- EPSS 0.08%
- Veröffentlicht 15.01.2021 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:42:12
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of vali...