Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Junos OS — Vulnerabilities & Security Advisories 660

All 660 CVE vulnerabilities found in Junos OS, with AI-generated Chinese analysis, references, and POCs.

Vendor: Juniper Networks

CVE IDTitleCVSSSeverityPublished
CVE-2021-0287 Junos OS and Junos OS Evolved: RPD could crash in SR-ISIS/MPLS environment due to a flap of an ISIS link in the network CWE-754 6.5 Medium2021-07-15
CVE-2021-0285 Junos OS: QFX5000 Series and EX4600 Series: Continuous traffic destined to a device configured with MC-LAG leading to nodes losing their control connection which can impact traffic CWE-770 7.5 High2021-07-15
CVE-2021-0283 Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore) CWE-120 7.5 High2021-07-15
CVE-2021-0282 Junos OS: RPD crash while processing a specific BGP UPDATE when Multipath or add-path features are enabled CWE-754 7.5 High2021-07-15
CVE-2021-0281 Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI CWE-754 5.9 Medium2021-07-15
CVE-2021-0280 Junos OS: PTX Series, QFX10K Series: Upon receipt of specific packets BFD sessions might flap due to DDoS policer implementation in Packet Forwarding Engine CWE-665 7.5 High2021-07-15
CVE-2021-0278 Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root. CWE-20 8.8 High2021-07-15
CVE-2021-0277 Junos OS and Junos OS Evolved: LLDP Out-of-Bounds Read vulnerability in l2cpd CWE-125 8.8 High2021-07-15
CVE-2021-0275 Junos OS: J-Web: Cross-site scripting attack allows an attacker to gain control of another users session. CWE-79 8.8 High2021-04-22
CVE-2021-0272 Junos OS: QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: In EVPN-VXLAN scenarios receipt of specific genuine packets by an adjacent attacker will cause a kernel memory leak in FPC. CWE-401 6.5 Medium2021-04-22
CVE-2021-0273 Junos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces. CWE-835 5.3 Medium2021-04-22
CVE-2021-0271 Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. 6.5 Medium2021-04-22
CVE-2021-0269 Junos OS: J-Web can be compromised through reflected client-side HTTP parameter pollution attacks. CWE-233 8.8 High2021-04-22
CVE-2021-0270 Junos OS: PTX Series, QFX10K Series: A PTX/QFX FPC may restart unexpectedly with the "inline-Jflow" feature enabled on a large-scale deployment CWE-362 7.5 High2021-04-22
CVE-2021-0268 Junos OS: J-Web has an Improper Neutralization of CRLF Sequences in its HTTP Headers which allows an attacker to carry out multiple types of attacks. CWE-113 8.8 High2021-04-22
CVE-2021-0266 cSRX: Use of Hard-coded Cryptographic Keys allows an attacker to take control of the device through device management services. CWE-321 8.1 High2021-04-22
CVE-2021-0267 Junos OS: Receipt of a crafted DHCP packet will cause the jdhcpd DHCP service to core. CWE-20 7.4 High2021-04-22
CVE-2021-0263 Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow sampling is enabled CWE-19 5.9 Medium2021-04-22
CVE-2021-0264 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured CWE-703 5.9 Medium2021-04-22
CVE-2021-0262 Junos OS: QFX10002-60C: Use after free vulnerability found during static code analysis CWE-416 6.5 Medium2021-04-22
CVE-2021-0260 Junos OS: SNMP fails to properly perform authorization checks on incoming received SNMP requests. CWE-285 7.3 High2021-04-22
CVE-2021-0261 Junos OS: Denial of Service vulnerability in J-Web and web based (HTTP/HTTPS) services caused by a high number of specific requests CWE-125 7.5 High2021-04-22
CVE-2021-0259 Junos OS and Junos OS Evolved: QFX5K Series: Underlay network traffic might not be processed upon receipt of high rate of specific genuine overlay packets in VXLAN scenario CWE-755 7.4 High2021-04-22
CVE-2021-0258 Junos OS: Kernel panic upon receipt of specific TCPv6 packet on management interface CWE-362 5.9 Medium2021-04-22
CVE-2021-0256 Junos OS: mosquitto Local Privilege Escalation vulnerability in SUID binaries CWE-250 5.5 Medium2021-04-22
CVE-2021-0257 Junos OS: MX Series, EX9200 Series: Trio-based MPCs memory leak in VPLS with integrated routing and bridging (IRB) interface CWE-400 6.5 Medium2021-04-22
CVE-2021-0255 Junos OS: ethtraceroute Local Privilege Escalation vulnerability in SUID binaries CWE-250 5.5 Medium2021-04-22
CVE-2021-0253 Junos OS: NFX Series: Local Command Execution Vulnerability in JDMD Leads to Privilege Escalation CWE-77 7.8 High2021-04-22
CVE-2021-0254 Junos OS: Remote code execution vulnerability in overlayd service CWE-131 9.8 Critical2021-04-22
CVE-2021-0252 Junos OS: NFX Series: Local Code Execution Vulnerability in JDMD Leads to Privilege Escalation CWE-77 7.8 High2021-04-22

All 660 known CVE vulnerabilities affecting Junos OS with full Chinese analysis, references, and POCs where available.