CVE-2021-0297
- EPSS 0.18%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 05:42:25
A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could l...
- EPSS 0.03%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 05:42:26
A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events ou...
- EPSS 0.34%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:28
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operatio...
- EPSS 0.41%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:29
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of ...
CVE-2021-31354
- EPSS 0.28%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:29
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacke...
CVE-2021-31356
- EPSS 0.14%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:29
A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of...
CVE-2021-31357
- EPSS 0.13%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:29
A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the co...
CVE-2021-0292
- EPSS 0.08%
- Published 15.07.2021 20:15:11
- Last modified 21.11.2024 05:42:25
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately res...
CVE-2021-0286
- EPSS 0.15%
- Published 15.07.2021 20:15:10
- Last modified 21.11.2024 05:42:24
A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx...
CVE-2021-0287
- EPSS 0.08%
- Published 15.07.2021 20:15:10
- Last modified 21.11.2024 05:42:24
In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead t...