| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-21586 | Junos OS: SRX Series and NFX Series: Specific valid traffic leads to a PFE crash | Juniper Networks | Junos OS | High | 7.5 | 2024-07-01 16:34:22 | Deep Dive |
| CVE-2024-2973 | Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed | Juniper Networks | Session Smart Router | Critical | 10.0 | 2024-06-27 20:17:50 | Deep Dive |
| CVE-2024-30380 | Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV | Juniper Networks | Junos OS | Medium | 6.5 | 2024-04-16 20:04:54 | Deep Dive |
| CVE-2024-30378 | Junos OS: MX Series: bbe-smgd process crash upon execution of specific CLI commands | Juniper Networks | Junos OS | Medium | 5.5 | 2024-04-16 20:03:56 | Deep Dive |
| CVE-2024-30403 | Junos OS Evolved: When MAC learning happens, and an interface gets flapped, the PFE crashes | Juniper Networks | Junos OS Evolved | Medium | 6.5 | 2024-04-12 15:28:10 | Deep Dive |
| CVE-2024-30402 | Junos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a specific subscription | Juniper Networks | Junos OS | Medium | 5.9 | 2024-04-12 15:27:33 | Deep Dive |
| CVE-2024-30401 | Junos OS: MX Series and EX9200-15C: Stack-based buffer overflow in aftman | Juniper Networks | Junos OS | Medium | 5.9 | 2024-04-12 15:26:58 | Deep Dive |
| CVE-2024-30398 | Junos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an eventual PFE crash | Juniper Networks | Junos OS | High | 7.5 | 2024-04-12 15:26:27 | Deep Dive |
| CVE-2024-30397 | Junos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process | Juniper Networks | Junos OS | High | 7.5 | 2024-04-12 15:25:55 | Deep Dive |
| CVE-2024-30391 | Junos OS: MX Series with SPC3, and SRX Series: When IPsec authentication is configured with "hmac-sha-384" and "hmac-sha-512" no authentication of traffic is performed | Juniper Networks | Junos OS | Medium | 4.8 | 2024-04-12 15:25:25 | Deep Dive |
| CVE-2024-30390 | Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced | Juniper Networks | Junos OS Evolved | Medium | 5.3 | 2024-04-12 15:24:51 | Deep Dive |
| CVE-2024-30389 | Junos OS: EX4300 Series: Firewall filter not blocking egress traffic | Juniper Networks | Junos OS | Medium | 5.8 | 2024-04-12 15:24:10 | Deep Dive |
| CVE-2024-30386 | Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash | Juniper Networks | Junos OS | Medium | 5.3 | 2024-04-12 15:23:24 | Deep Dive |
| CVE-2024-30384 | Junos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur | Juniper Networks | Junos OS | Medium | 5.5 | 2024-04-12 15:22:40 | Deep Dive |
| CVE-2024-30382 | Junos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured | Juniper Networks | Junos OS | High | 7.5 | 2024-04-12 15:22:03 | Deep Dive |
| CVE-2024-30387 | Junos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash | Juniper Networks | Junos OS | Medium | 6.5 | 2024-04-12 15:20:05 | Deep Dive |
| CVE-2024-30388 | Junos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps | Juniper Networks | Junos OS | Medium | 6.5 | 2024-04-12 15:09:13 | Deep Dive |
| CVE-2024-30392 | Junos OS: MX Series with SPC3 and MS-MPC/-MIC: When URL filtering is enabled and a specific URL request is received a flowd crash occurs | Juniper Networks | Junos OS | High | 7.5 | 2024-04-12 15:07:48 | Deep Dive |
| CVE-2024-30394 | Junos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash | Juniper Networks | Junos OS | High | 7.5 | 2024-04-12 15:07:36 | Deep Dive |
| CVE-2024-30395 | Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash | Juniper Networks | Junos OS | High | 7.5 | 2024-04-12 15:07:20 | Deep Dive |