| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-30647 | Junos OS: MX Series: Subscriber login/logout activity will lead to a memory leak | Juniper Networks | Junos OS | Medium | 6.5 | 2025-04-09 19:54:00 | Deep Dive |
| CVE-2025-30646 | Junos OS and Junos OS Evolved: Receipt of a malformed LLDP TLV results in l2cpd crash | Juniper Networks | Junos OS | Medium | 6.5 | 2025-04-09 19:53:27 | Deep Dive |
| CVE-2025-30645 | Junos OS: SRX Series: Transmission of specific control traffic sent out of a DS-Lite tunnel results in flowd crash | Juniper Networks | Junos OS | High | 7.5 | 2025-04-09 19:52:52 | Deep Dive |
| CVE-2025-30644 | Junos OS: EX2300, EX3400, EX4000 Series, QFX5k Series: Receipt of a specific DHCP packet causes FPC crash when DHCP Option 82 is enabled | Juniper Networks | Junos OS | High | 7.5 | 2025-04-09 19:52:17 | Deep Dive |
| CVE-2025-21601 | Junos OS: SRX and EX Series, MX240, MX480, MX960, QFX5120 Series: When web management is enabled for specific services an attacker may cause a CPU spike by sending genuine packets to the device | Juniper Networks | Junos OS | High | 7.5 | 2025-04-09 19:51:36 | Deep Dive |
| CVE-2025-21597 | Junos OS and Junos OS Evolved: When BGP rib-sharding and update-threading are configured and a peer flaps, an rpd core is observed | Juniper Networks | Junos OS | Medium | 5.3 | 2025-04-09 19:50:58 | Deep Dive |
| CVE-2025-21595 | Junos OS and Junos OS Evolved: In an EVPN-VXLAN scenario specific ARP or NDP packets cause FPC to crash | Juniper Networks | Junos OS | Medium | 6.5 | 2025-04-09 19:50:28 | Deep Dive |
| CVE-2025-21594 | Junos OS: MX Series: In DS-lite and NAT scenario receipt of crafted IPv6 traffic causes port block | Juniper Networks | Junos OS | High | 7.5 | 2025-04-09 19:49:41 | Deep Dive |
| CVE-2025-21591 | Junos OS: An unauthenticated adjacent attacker sending a malformed DHCP packet causes jdhcpd to crash | Juniper Networks | Junos OS | High | 7.4 | 2025-04-09 19:46:56 | Deep Dive |
| CVE-2025-21590 | Junos OS: An local attacker with shell access can execute arbitrary code | Juniper Networks | Junos OS | Medium | 4.4 | 2025-03-12 13:59:43 | Deep Dive |
| CVE-2024-39564 | Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash | Juniper Networks | Junos OS | High | 7.5 | 2025-02-05 15:31:23 | Deep Dive |
| CVE-2025-21598 | Junos OS and Junos OS Evolved: When BGP traceoptions are configured, receipt of malformed BGP packets causes RPD to crash | Juniper Networks | Junos OS | High | 7.5 | 2025-01-09 18:16:33 | Deep Dive |
| CVE-2025-21600 | Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash | Juniper Networks | Junos OS | Medium | 6.5 | 2025-01-09 16:49:42 | Deep Dive |
| CVE-2025-21602 | Junos OS and Junos OS Evolved: Receipt of specially crafted BGP update packet causes RPD crash | Juniper Networks | Junos OS | Medium | 6.5 | 2025-01-09 16:49:25 | Deep Dive |
| CVE-2025-21599 | Junos OS Evolved: Receipt of specifically malformed IPv6 packets causes kernel memory exhaustion leading to Denial of Service | Juniper Networks | Junos OS Evolved | High | 7.5 | 2025-01-09 16:46:57 | Deep Dive |
| CVE-2025-21596 | Junos OS: SRX1500,SRX4100,SRX4200: Execution of low-privileged CLI command results in chassisd crash | Juniper Networks | Junos OS | Medium | 5.5 | 2025-01-09 16:41:51 | Deep Dive |
| CVE-2025-21593 | Junos OS and Junos OS Evolved: On SRv6 enabled devices, an attacker sending a malformed BGP update can cause the rpd to crash | Juniper Networks | Junos OS | Medium | 6.5 | 2025-01-09 16:41:09 | Deep Dive |
| CVE-2025-21592 | Junos OS: SRX Series: Low privileged user able to access highly sensitive information on file system | Juniper Networks | Junos OS | Medium | 5.5 | 2025-01-09 16:39:56 | Deep Dive |
| CVE-2024-47507 | Junos OS and Junos OS Evolved: BGP update message containing aggregator attribute with an ASN value of zero (0) is accepted | Juniper Networks | Junos OS | Medium | 5.8 | 2024-10-11 15:38:17 | Deep Dive |
| CVE-2024-47506 | Junos OS: SRX Series: A large amount of traffic being processed by ATP Cloud can lead to a PFE crash | Juniper Networks | Junos OS | Medium | 5.9 | 2024-10-11 15:37:33 | Deep Dive |