CVE-2026-21921
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:28:29
- Zuletzt bearbeitet 23.01.2026 18:52:35
A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are fre...
CVE-2026-21909
- EPSS 0.02%
- Veröffentlicht 15.01.2026 20:22:44
- Zuletzt bearbeitet 23.01.2026 19:40:48
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker controlling an adjacent IS-IS neighbor to send a specific update...
CVE-2026-21908
- EPSS 0.04%
- Veröffentlicht 15.01.2026 20:21:41
- Zuletzt bearbeitet 23.01.2026 19:40:42
A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, lea...
CVE-2025-60011
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:16:47
- Zuletzt bearbeitet 23.01.2026 19:39:45
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an availability impact for downstr...
CVE-2025-60003
- EPSS 0.05%
- Veröffentlicht 15.01.2026 20:15:04
- Zuletzt bearbeitet 23.01.2026 19:39:25
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP upda...
CVE-2025-59961
- EPSS 0.01%
- Veröffentlicht 15.01.2026 20:14:43
- Zuletzt bearbeitet 23.01.2026 19:39:19
An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd pro...
CVE-2025-59960
- EPSS 0.03%
- Veröffentlicht 15.01.2026 20:14:00
- Zuletzt bearbeitet 23.01.2026 19:39:11
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to ...
CVE-2025-60010
- EPSS 0.04%
- Veröffentlicht 09.10.2025 16:20:28
- Zuletzt bearbeitet 23.01.2026 19:38:40
A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change. Affected devices allow logins ...
CVE-2025-60004
- EPSS 0.06%
- Veröffentlicht 09.10.2025 16:18:27
- Zuletzt bearbeitet 23.01.2026 19:38:03
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS). When a...
- EPSS 0.02%
- Veröffentlicht 09.10.2025 15:45:19
- Zuletzt bearbeitet 23.01.2026 18:36:28
An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP sharding configured allows an attacker triggering indirect next-hop updates, along with timing outside th...