Juniper

Junos Evolved

50 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 15.01.2026 20:28:29
  • Zuletzt bearbeitet 23.01.2026 18:52:35

A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are fre...

  • EPSS 0.02%
  • Veröffentlicht 15.01.2026 20:22:44
  • Zuletzt bearbeitet 23.01.2026 19:40:48

A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker controlling an adjacent IS-IS neighbor to send a specific update...

  • EPSS 0.04%
  • Veröffentlicht 15.01.2026 20:21:41
  • Zuletzt bearbeitet 23.01.2026 19:40:42

A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, lea...

  • EPSS 0.05%
  • Veröffentlicht 15.01.2026 20:16:47
  • Zuletzt bearbeitet 23.01.2026 19:39:45

An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an availability impact for downstr...

  • EPSS 0.05%
  • Veröffentlicht 15.01.2026 20:15:04
  • Zuletzt bearbeitet 23.01.2026 19:39:25

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP upda...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2026 20:14:43
  • Zuletzt bearbeitet 23.01.2026 19:39:19

An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd pro...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2026 20:14:00
  • Zuletzt bearbeitet 23.01.2026 19:39:11

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to ...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 09.10.2025 16:20:28
  • Zuletzt bearbeitet 23.01.2026 19:38:40

A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change. Affected devices allow logins ...

Medienbericht
  • EPSS 0.06%
  • Veröffentlicht 09.10.2025 16:18:27
  • Zuletzt bearbeitet 23.01.2026 19:38:03

An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS). When a...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 09.10.2025 15:45:19
  • Zuletzt bearbeitet 23.01.2026 18:36:28

An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP sharding configured allows an attacker triggering indirect next-hop updates, along with timing outside th...