Juniper

Junos Os Evolved

200 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 11.10.2024 16:15:09
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. T...

  • EPSS 0.07%
  • Veröffentlicht 11.10.2024 16:15:08
  • Zuletzt bearbeitet 21.11.2024 09:39:49

An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traf...

  • EPSS 0.1%
  • Veröffentlicht 11.10.2024 16:15:08
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased co...

  • EPSS 0.02%
  • Veröffentlicht 11.10.2024 16:15:07
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information. O...

  • EPSS 0.02%
  • Veröffentlicht 11.10.2024 16:15:07
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to ca...

  • EPSS 0.03%
  • Veröffentlicht 11.10.2024 16:15:06
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved o...

  • EPSS 0.02%
  • Veröffentlicht 11.10.2024 16:15:06
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast addr...

  • EPSS 0.09%
  • Veröffentlicht 09.10.2024 20:15:08
  • Zuletzt bearbeitet 10.10.2024 12:51:56

An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to ca...

  • EPSS 0.09%
  • Veröffentlicht 09.10.2024 20:15:08
  • Zuletzt bearbeitet 16.10.2024 22:15:02

An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and rest...

  • EPSS 0.15%
  • Veröffentlicht 09.10.2024 20:15:08
  • Zuletzt bearbeitet 10.10.2024 12:51:56

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash a...