Juniper

Junos Os Evolved

200 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.54%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:14

On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustai...

  • EPSS 0.22%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:16

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configu...

  • EPSS 0.2%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:16

In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations wi...

  • EPSS 0.08%
  • Veröffentlicht 15.01.2021 18:15:15
  • Zuletzt bearbeitet 21.11.2024 05:42:12

In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of vali...

  • EPSS 0.39%
  • Veröffentlicht 15.01.2021 18:15:15
  • Zuletzt bearbeitet 21.11.2024 05:42:12

An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route ...

  • EPSS 0.17%
  • Veröffentlicht 15.01.2021 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:42:12

An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashe...

  • EPSS 0.08%
  • Veröffentlicht 16.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:08

On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by...

  • EPSS 0.14%
  • Veröffentlicht 16.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:09

Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts...

  • EPSS 0.04%
  • Veröffentlicht 16.10.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:07

The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the cons...

  • EPSS 0.39%
  • Veröffentlicht 17.07.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:04

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE f...