Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0235 Junos OS: SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series: In a multi-tenant environment, a tenant host administrator may configure logical firewall isolation affecting other tenant networks — Junos OSCWE-276 7.3 High2021-04-22
CVE-2021-0236 Junos OS: A specific BGP VPNv6 flowspec message causes routing protocol daemon (rpd) process to crash with a core. — Junos OSCWE-754 6.5 Medium2021-04-22
CVE-2021-0234 Junos OS: QFX5100-96S: DDoS protection does not work as expected. — Junos OS 5.8 Medium2021-04-22
CVE-2021-0232 Paragon Active Assurance: Authentication bypass vulnerability in Control Center — Paragon Active AssuranceCWE-284 7.4 High2021-04-22
CVE-2021-0233 Junos OS: ACX500 Series, ACX4000 Series: Denial of Service due to FFEB crash while processing high rate of specific packets. — Junos OSCWE-794 7.5 High2021-04-22
CVE-2021-0231 Junos OS: SRX, vSRX Series: J-Web Path traversal vulnerability in SRX and vSRX Series leads to information disclosure. — Junos OSCWE-22 6.5 Medium2021-04-22
CVE-2021-0229 Junos OS: Receipt of specific packets could lead to Denial of Service in MQTT Server — Junos OSCWE-400 5.3 Medium2021-04-22
CVE-2021-0230 Junos OS: SRX Series: Memory leak when querying Aggregated Ethernet (AE) interface statistics — Junos OSCWE-400 7.5 High2021-04-22
CVE-2021-0228 Junos OS: MX Series: DDoS LACP violation upon receipt of specific layer 2 frames in EVPN-VXLAN deployment — Junos OSCWE-754 6.5 Medium2021-04-22
CVE-2021-0226 Junos OS Evolved: The IPv6 BGP session will flap due to receipt of a specific IPv6 packet — Junos OS Evolved 7.1 High2021-04-22
CVE-2021-0227 Junos OS: SRX Series: Denial of Service in J-Web upon receipt of crafted HTTP packets — Junos OSCWE-119 7.5 High2021-04-22
CVE-2021-0225 Junos OS Evolved: Stateless IP firewall filter does not work as expected — Junos OS EvolvedCWE-754 5.8 Medium2021-04-22
CVE-2021-0224 Junos OS: ANCPD core when hitting maximum-discovery-table-entries limit — Junos OSCWE-770 6.5 Medium2021-04-22
CVE-2021-0214 Junos OS: Denial of Service in ppmd upon receipt of malformed packet — Junos OSCWE-20 6.5 Medium2021-04-22
CVE-2021-0216 Junos OS: ACX5448, ACX710: BFD sessions might flap due to high rate of transit ARP packets — Junos OS 6.5 Medium2021-04-22
CVE-2021-0222 Junos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagating Denial of Service may occur. — Junos OS 7.4 High2021-01-15
CVE-2021-0223 Junos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries — Junos OSCWE-250 7.8 High2021-01-15
CVE-2021-0221 Junos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP multicast traffic — Junos OSCWE-703 6.5 Medium2021-01-15
CVE-2021-0219 Junos OS: Command injection vulnerability in 'request system software' CLI command — Junos OSCWE-78 6.7 Medium2021-01-15
CVE-2021-0220 Junos Space: Shared secrets stored in recoverable format and directly exposed through the UI — Junos SpaceCWE-257 6.8 Medium2021-01-15
CVE-2021-0218 Junos OS: Command injection vulnerability in license-check daemon — Junos OSCWE-78 7.8 High2021-01-15
CVE-2021-0215 Junos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwarding engine due to 802.1X authenticator port interface flaps — Junos OSCWE-400 6.5 Medium2021-01-15
CVE-2021-0217 Junos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets — Junos OSCWE-119 7.4 High2021-01-15
CVE-2021-0211 Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network traffic may be disrupted. — Junos OS 10.0 Critical2021-01-15
CVE-2021-0212 Contrail Networking: Administrator credentials are exposed in a plaintext file — Contrail NetworkingCWE-200 5.0 Medium2021-01-15
CVE-2021-0210 Junos OS: Privilege escalation in J-Web due to arbitrary command and code execution via information disclosure from another users active session — Junos OS 6.8 Medium2021-01-15
CVE-2021-0209 Junos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD to core when using REGEX. — Junos OS EvolvedCWE-824 6.5 Medium2021-01-15
CVE-2021-0207 NFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series: Certain genuine traffic received by the Junos OS device will be discarded instead of forwarded. — Junos OSCWE-436 7.5 High2021-01-15
CVE-2021-0208 Junos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router RPD may core upon receipt of specific malformed RSVP packet. — Junos OSCWE-20 8.8 High2021-01-15
CVE-2021-0205 Junos OS: MX Series: Dynamic filter fails to match IPv6 prefix — Junos OSCWE-284 5.8 Medium2021-01-15

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.