CVE-2021-0225
- EPSS 0.19%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:14
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An admin...
CVE-2021-0226
- EPSS 0.54%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:14
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustai...
CVE-2021-0236
- EPSS 0.22%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:16
Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configu...
CVE-2021-0239
- EPSS 0.2%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:16
In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations wi...
CVE-2021-0209
- EPSS 0.08%
- Veröffentlicht 15.01.2021 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:42:12
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of vali...
CVE-2021-0211
- EPSS 0.39%
- Veröffentlicht 15.01.2021 18:15:15
- Zuletzt bearbeitet 21.11.2024 05:42:12
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route ...
CVE-2021-0208
- EPSS 0.17%
- Veröffentlicht 15.01.2021 18:15:14
- Zuletzt bearbeitet 21.11.2024 05:42:12
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashe...
CVE-2020-1678
- EPSS 0.08%
- Veröffentlicht 16.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:08
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by...
CVE-2020-1681
- EPSS 0.14%
- Veröffentlicht 16.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:11:09
Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts...
CVE-2020-1666
- EPSS 0.04%
- Veröffentlicht 16.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:07
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the cons...