| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2020-1637 | Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability | Juniper Networks | Junos OS | High | 7.2 | 2020-04-08 19:26:01 | Deep Dive |
| CVE-2020-1629 | Junos OS: A race condition vulnerability may cause RPD daemon to crash when processing a BGP NOTIFICATION message. | Juniper Networks | Junos OS | Medium | 5.9 | 2020-04-08 19:26:00 | Deep Dive |
| CVE-2020-1630 | Junos OS: Privilege escalation vulnerability in dual REs, VC or HA cluster may allow unauthorized configuration change. | Juniper Networks | Junos OS | Medium | 5.0 | 2020-04-08 19:26:00 | Deep Dive |
| CVE-2020-1627 | Junos OS: vMX and MX150: Denial of Service vulnerability in packet processing | Juniper Networks | Junos OS | High | 7.5 | 2020-04-08 19:25:59 | Deep Dive |
| CVE-2020-1628 | Junos OS: EX4300: Traffic from the network internal to the device (128.0.0.0) may be forwarded to egress interfaces | Juniper Networks | Junos OS | Medium | 5.3 | 2020-04-08 19:25:59 | Deep Dive |
| CVE-2020-1624 | Junos OS Evolved: objmon logs may leak sensitive information | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:58 | Deep Dive |
| CVE-2020-1625 | Junos OS: Kernel memory leak in virtual-memory due to interface flaps | Juniper Networks | Junos OS | Medium | 6.5 | 2020-04-08 19:25:58 | Deep Dive |
| CVE-2020-1626 | Junos OS Evolved: Denial of Service vulnerability in processing high rate of specific packets | Juniper Networks | Junos OS Evolved | High | 7.5 | 2020-04-08 19:25:58 | Deep Dive |
| CVE-2020-1622 | Junos OS Evolved: EvoSharedObjStore may leak sensitive information | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:57 | Deep Dive |
| CVE-2020-1623 | Junos OS Evolved: ev.ops file may leak sensitive information | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:57 | Deep Dive |
| CVE-2020-1620 | Junos OS Evolved: Configd leaks hashes via log file and is world readable | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:56 | Deep Dive |
| CVE-2020-1621 | Junos OS Evolved: Configd leaks hashes via stream and is world readable | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:56 | Deep Dive |
| CVE-2020-1618 | Junos OS: EX and QFX Series: Console port authentication bypass vulnerability | Juniper Networks | Junos OS | Medium | 6.3 | 2020-04-08 19:25:55 | Deep Dive |
| CVE-2020-1619 | Junos OS: QFX10K Series, EX9200 Series, MX Series, PTX Series: Privilege escalation vulnerability in NG-RE. | Juniper Networks | Junos OS | Medium | 6.0 | 2020-04-08 19:25:55 | Deep Dive |
| CVE-2020-1616 | JATP Series: JATP Is susceptible to slow brute force attacks on the SSH service. | Juniper Networks | JATP | Medium | 5.3 | 2020-04-08 19:25:54 | Deep Dive |
| CVE-2020-1617 | Junos OS: PTX1000 and PTX10000 Series, QFX10000 Series using non-AFT architectures: A specific genuine packet inspected by sFlow will cause a reboot. | Juniper Networks | Junos OS | High | 7.5 | 2020-04-08 19:25:54 | Deep Dive |
| CVE-2020-1614 | NFX250 Series: Hardcoded credentials in the vSRX VNF instance. | Juniper Networks | Juniper Networks NFX Series Network Services Platform | Critical | 10.0 | 2020-04-08 19:25:53 | Deep Dive |
| CVE-2020-1615 | Junos OS: vMX: Default credentials supplied in vMX configuration | Juniper Networks | Junos OS | Critical | 9.8 | 2020-04-08 19:25:53 | Deep Dive |
| CVE-2020-1613 | Junos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement. | Juniper Networks | Junos OS | High | 8.6 | 2020-04-08 19:25:52 | Deep Dive |
| CVE-2020-1608 | Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service | Juniper Networks | Junos OS | High | 7.5 | 2020-01-15 08:40:38 | Deep Dive |