| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2022-22168 | Junos OS: vMX and MX150: Specific packets might cause a memory leak and eventually an FPC reboot | Juniper Networks | Junos OS | Medium | 6.5 | 2022-01-19 00:21:14 | Deep Dive |
| CVE-2022-22167 | Junos OS: SRX Series: If no-syn-check is enabled, traffic classified as UNKNOWN gets permitted by pre-id-default-policy | Juniper Networks | Junos OS | High | 7.2 | 2022-01-19 00:21:13 | Deep Dive |
| CVE-2022-22166 | Junos OS: An rpd core will occur if BGP update tracing is configured and an update containing a malformed BGP SR-TE policy tunnel attribute is received | Juniper Networks | Junos OS | Medium | 6.5 | 2022-01-19 00:21:12 | Deep Dive |
| CVE-2022-22164 | Junos OS Evolved: Telnet service may be enabled when it is expected to be disabled. | Juniper Networks | Junos OS Evolved | Medium | 6.5 | 2022-01-19 00:21:10 | Deep Dive |
| CVE-2022-22163 | Junos OS: jdhcpd crashes upon receipt of a specific DHCPv6 packet | Juniper Networks | Junos OS | High | 7.4 | 2022-01-19 00:21:09 | Deep Dive |
| CVE-2022-22162 | Junos OS: A low privileged user can elevate their privileges to the ones of the highest privileged j-web user logged in | Juniper Networks | Junos OS | High | 7.3 | 2022-01-19 00:21:07 | Deep Dive |
| CVE-2022-22161 | Junos OS: MX104 might become unresponsive if the out-of-band management port receives a flood of traffic | Juniper Networks | Junos OS | High | 7.5 | 2022-01-19 00:21:06 | Deep Dive |
| CVE-2022-22160 | Junos OS: MX Series: The bbe-smgd process crashes if an unsupported configuration exists and a PPPoE client sends a specific message | Juniper Networks | Junos OS | Medium | 6.5 | 2022-01-19 00:21:04 | Deep Dive |
| CVE-2022-22159 | Junos OS: An attacker sending crafted packets can cause a traffic and CPU Denial of Service (DoS). | Juniper Networks | Junos OS | High | 7.5 | 2022-01-19 00:21:02 | Deep Dive |
| CVE-2022-22157 | Junos OS: SRX Series: Traffic classification vulnerability when 'no-syn-check' is enabled | Juniper Networks | Junos OS | High | 7.2 | 2022-01-19 00:21:00 | Deep Dive |
| CVE-2022-22156 | Junos OS: Certificate validation is skipped when fetching system scripts from a HTTPS URL | Juniper Networks | Junos OS | Medium | 6.5 | 2022-01-19 00:20:59 | Deep Dive |
| CVE-2022-22155 | Junos OS: ACX5448: FPC memory leak due to IPv6 neighbor flaps | Juniper Networks | Junos OS | Medium | 6.5 | 2022-01-19 00:20:58 | Deep Dive |
| CVE-2022-22154 | Junos Fusion: A Satellite Device can be controlled by rewiring it to a foreign AD causing a DoS | Juniper Networks | Junos OS | Medium | 6.8 | 2022-01-19 00:20:56 | Deep Dive |
| CVE-2022-22153 | SRX Series and MX Series with SPC3: A high percentage of fragments might lead to high latency or packet drops | Juniper Networks | Junos OS | High | 7.5 | 2022-01-19 00:20:55 | Deep Dive |
| CVE-2022-22152 | Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface | Juniper Networks | Contrail Service Orchestration | High | 7.7 | 2022-01-19 00:20:53 | Deep Dive |
| CVE-2021-31386 | Junos OS: When using J-Web with HTTP an attacker may retrieve encryption keys via Person-in-the-Middle attacks. | Juniper Networks | Junos OS | Medium | 5.3 | 2021-10-19 18:17:32 | Deep Dive |
| CVE-2021-31385 | Junos OS: J-Web: A path traversal vulnerability allows an authenticated attacker to elevate their privileges to root | Juniper Networks | Junos OS | High | 8.8 | 2021-10-19 18:17:30 | Deep Dive |
| CVE-2021-31384 | Junos OS: SRX Series: Under a specific device configuration an attacker can access the devices J-Web management services from any interface, regardless of security settings protecting the service | Juniper Networks | Junos OS | High | 7.2 | 2021-10-19 18:17:28 | Deep Dive |
| CVE-2021-31383 | Junos OS and Junos OS Evolved: In Point to MultiPoint (P2MP) scenarios receipt of various crafted packets causes RPD to core. | Juniper Networks | Junos OS | High | 7.5 | 2021-10-19 18:17:26 | Deep Dive |
| CVE-2021-31382 | Junos OS: PTX1000 System, PTX10002-60C System: After upgrading, configured firewall filters may be applied on incorrect interfaces | Juniper Networks | Junos OS | Medium | 6.5 | 2021-10-19 18:17:25 | Deep Dive |