CVE-2020-1648
- EPSS 0.39%
- Veröffentlicht 17.07.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:04
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt ...
CVE-2020-1644
- EPSS 0.39%
- Veröffentlicht 17.07.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:04
On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This i...
CVE-2020-1632
- EPSS 0.55%
- Veröffentlicht 15.04.2020 21:15:35
- Zuletzt bearbeitet 21.11.2024 05:11:02
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP se...
CVE-2020-1638
- EPSS 0.39%
- Veröffentlicht 08.04.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:03
The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. Only packets destined to the device itself, successfully reaching the RE through existing edge and control plan...
CVE-2020-1620
- EPSS 0.13%
- Veröffentlicht 08.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:00
A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved prior to 19.3R1.
CVE-2020-1621
- EPSS 0.13%
- Veröffentlicht 08.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:01
A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved prior to 19.3R1.
CVE-2020-1622
- EPSS 0.13%
- Veröffentlicht 08.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:01
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
CVE-2020-1623
- EPSS 0.05%
- Veröffentlicht 08.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:01
A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved prior to 19.2R1.
CVE-2020-1624
- EPSS 0.12%
- Veröffentlicht 08.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:01
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
CVE-2020-1626
- EPSS 0.47%
- Veröffentlicht 08.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:01
A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packe...