Juniper

Junos Evolved

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.01%
  • Veröffentlicht 09.04.2025 20:00:36
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged, authenticated attacker with access to the CLI to access sensitive...

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 09.04.2025 19:57:37
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Expired Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).On all Junos OS and Junos OS Evolved platfor...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 09.04.2025 19:57:01
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS). When ...

Medienbericht
  • EPSS 0.1%
  • Veröffentlicht 09.04.2025 19:56:28
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When an attacker se...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:54:41
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS)....

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 09.04.2025 19:53:27
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TL...

  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:50:57
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS). On all ...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:50:28
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to Denial of Ser...

  • EPSS 0.19%
  • Veröffentlicht 05.02.2025 16:15:40
  • Zuletzt bearbeitet 05.02.2025 16:15:40

This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Pa...

  • EPSS 0.17%
  • Veröffentlicht 09.01.2025 19:15:20
  • Zuletzt bearbeitet 09.01.2025 19:15:20

An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace opt...