Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2025-52960 Junos OS: SRX Series and MX Series: Receipt of specific SIP packets in a high utilization situation causes a flowd/mspmand crash — Junos OSCWE-120 5.9 Medium2025-10-09
CVE-2025-11198 Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server — Security Director Policy EnforcerCWE-306 7.4 High2025-10-09
CVE-2025-52988 Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout' — Junos OSCWE-78 6.7 Medium2025-07-11
CVE-2025-6549 Junos OS: SRX Series: J-Web can be exposed on additional interfaces — Junos OSCWE-863 6.5 Medium2025-07-11
CVE-2025-52989 Junos OS and Junos OS Evolved: Annotate configuration command can be used to change the configuration — Junos OSCWE-140 5.1 Medium2025-07-11
CVE-2025-52986 Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks — Junos OSCWE-401 5.5 Medium2025-07-11
CVE-2025-52985 Junos OS Evolved: When a control-plane firewall filter refers to a prefix-list with more than 10 entries it's not matching — Junos OS EvolvedCWE-480 5.3 Medium2025-07-11
CVE-2025-52984 Junos OS and Junos OS Evolved: When a static route points to a reject next-hop and a gNMI query for this route is processed, RPD crashes — Junos OSCWE-476 5.9 Medium2025-07-11
CVE-2025-52983 Junos OS: After removing ssh public key authentication root can still log in — Junos OSCWE-446 7.2 High2025-07-11
CVE-2025-52982 Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash — Junos OSCWE-404 5.9 Medium2025-07-11
CVE-2025-52981 Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash — Junos OSCWE-754 7.5 High2025-07-11
CVE-2025-52980 Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message — Junos OSCWE-198 7.5 High2025-07-11
CVE-2025-52964 Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipath configured — Junos OSCWE-617 6.5 Medium2025-07-11
CVE-2025-52963 Junos OS: A low-privileged user can disable an interface — Junos OSCWE-284 5.5 Medium2025-07-11
CVE-2025-52953 Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset — Junos OSCWE-440 6.5 Medium2025-07-11
CVE-2025-52952 Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash — Junos OSCWE-787 6.5 Medium2025-07-11
CVE-2025-52958 Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash — Junos OSCWE-617 5.3 Medium2025-07-11
CVE-2025-52955 Junos OS and Junos OS Evolved: When jflow/sflow is configured continuous logical interface flaps causes rpd crash and restart — Junos OSCWE-131 6.5 Medium2025-07-11
CVE-2025-52954 Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system — Junos OS EvolvedCWE-862 7.8 High2025-07-11
CVE-2025-52951 Junos OS: IPv6 firewall filter fails to match payload-protocol — Junos OSCWE-693 5.8 Medium2025-07-11
CVE-2025-52950 Juniper Security Director: Insufficient authorization for multiple endpoints in web interface — Juniper Security DirectorCWE-862 9.6 Critical2025-07-11
CVE-2025-52949 Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-130 6.5 Medium2025-07-11
CVE-2025-52948 Junos OS: Specific unknown traffic pattern causes FPC and system to crash when packet capturing is enabled — Junos OSCWE-755 5.9 Medium2025-07-11
CVE-2025-52947 Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface flap causes the FEB to crash — Junos OSCWE-755 6.5 Medium2025-07-11
CVE-2025-52946 Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash — Junos OSCWE-416 7.5 High2025-07-11
CVE-2025-30661 Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation — Junos OSCWE-732 7.3 High2025-07-11
CVE-2025-30660 Junos OS: MX Series: Decapsulation of specific GRE packets leads to PFE reset — Junos OSCWE-754 7.5 High2025-04-09
CVE-2025-30659 Junos OS: SRX Series: A device configured for vector routing crashes when receiving malformed traffic — Junos OSCWE-130 7.5 High2025-04-09
CVE-2025-30658 Junos OS: SRX Series: On devices with Anti-Virus enabled, malicious server responses will cause memory to leak ultimately causing forwarding to stop — Junos OSCWE-401 7.5 High2025-04-09
CVE-2025-30657 Junos OS: Processing of a specific BGP update causes the SRRD process to crash — Junos OSCWE-116 5.3 Medium2025-04-09

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.