Juniper

Junos Os Evolved

196 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Published 15.01.2021 18:15:15
  • Last modified 21.11.2024 05:42:12

An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route ...

  • EPSS 0.17%
  • Published 15.01.2021 18:15:14
  • Last modified 21.11.2024 05:42:12

An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashe...

  • EPSS 0.08%
  • Published 16.10.2020 21:15:13
  • Last modified 21.11.2024 05:11:08

On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by...

  • EPSS 0.31%
  • Published 16.10.2020 21:15:13
  • Last modified 21.11.2024 05:11:09

Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts...

  • EPSS 0.04%
  • Published 16.10.2020 21:15:12
  • Last modified 21.11.2024 05:11:07

The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the cons...

  • EPSS 0.39%
  • Published 17.07.2020 19:15:13
  • Last modified 21.11.2024 05:11:04

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE f...

  • EPSS 0.39%
  • Published 17.07.2020 19:15:13
  • Last modified 21.11.2024 05:11:04

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt ...

  • EPSS 0.39%
  • Published 17.07.2020 19:15:12
  • Last modified 21.11.2024 05:11:04

On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This i...

  • EPSS 0.55%
  • Published 15.04.2020 21:15:35
  • Last modified 21.11.2024 05:11:02

In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP se...

  • EPSS 0.39%
  • Published 08.04.2020 20:15:14
  • Last modified 21.11.2024 05:11:03

The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plan...