Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2023-22405 Junos OS: QFX5k Series, EX46xx Series: MAC limiting feature stops working after PFE restart or device reboot — Junos OSCWE-1250 6.5 Medium2023-01-12
CVE-2023-22404 Junos OS: SRX Series and MX Series with SPC3: When IPsec VPN is configured iked will core when a specifically formatted payload is received — Junos OSCWE-787 6.5 Medium2023-01-12
CVE-2023-22403 Junos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic — Junos OSCWE-770 7.5 High2023-01-12
CVE-2023-22402 Junos OS Evolved: The kernel might restart in a BGP scenario where "bgp auto-discovery" is enabled and such a neighbor flaps — Junos OS EvolvedCWE-416 5.9 Medium2023-01-12
CVE-2023-22401 Junos OS and Junos OS Evolved: PTX10008, PTX10016: When a specific SNMP MIB is queried the FPC will crash — Junos OSCWE-129 7.5 High2023-01-12
CVE-2023-22400 Junos OS Evolved: A specific SNMP GET operation and a specific CLI commands cause resources to leak and eventually the evo-pfemand process will crash — Junos OS EvolvedCWE-400 7.5 High2023-01-12
CVE-2023-22399 Junos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled — Junos OSCWE-120 7.5 High2023-01-12
CVE-2023-22398 Junos OS and Junos OS Evolved: RPD might crash when MPLS ping is performed on BGP LSPs — Junos OSCWE-824 5.3 Medium2023-01-12
CVE-2023-22397 Junos OS Evolved: PTX10003: An attacker sending specific genuine packets will cause a memory leak in the PFE leading to a Denial of Service — Junos OS EvolvedCWE-770 6.1 Medium2023-01-12
CVE-2023-22396 Junos OS: Receipt of crafted TCP packets destined to the device results in MBUF leak leading to a Denial of Service (DoS) — Junos OSCWE-400 7.5 High2023-01-12
CVE-2023-22395 Junos OS: In an MPLS scenario the processing of specific packets to the device causes a buffer leak and ultimately a loss of connectivity — Junos OSCWE-401 6.5 Medium2023-01-12
CVE-2023-22394 Junos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls — Junos OSCWE-911 7.5 High2023-01-12
CVE-2023-22393 Junos OS and Junos OS Evolved: RPD crash upon receipt of BGP route with invalid next-hop — Junos OSCWE-358 7.5 High2023-01-12
CVE-2023-22391 Junos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS) — Junos OSCWE-755 7.5 High2023-01-12
CVE-2023-22416 Junos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash if SIP ALG is enabled and a malformed SIP packet is received — Junos OSCWE-120 7.5 High2023-01-12
CVE-2022-22184 Junos OS and Junos OS Evolved: A BGP session will flap upon receipt of a specific, optional transitive attribute in version 22.3R1 — Junos OSCWE-20 7.5 High2022-12-23
CVE-2022-22251 cSRX Series: Storing Passwords in a Recoverable Format and software permissions issues allows a local attacker to elevate privileges — Junos OSCWE-257 7.8 High2022-10-18
CVE-2022-22250 Junos OS and Junos OS Evolved: An FPC crash might be seen due to an EVPN MAC entry moving from local to remote — Junos OS 6.5 Medium2022-10-18
CVE-2022-22249 Junos OS: MX Series: An FPC crash might be seen due to mac-moves within the same bridge domain — Junos OS 6.5 Medium2022-10-18
CVE-2022-22248 Junos OS Evolved: Incorrect file permissions can allow low-privileged user to cause another user to execute arbitrary commands — Junos OS EvolvedCWE-732 7.3 High2022-10-18
CVE-2022-22247 Junos OS Evolved: Kernel processing of unvalidated TCP segments could lead to a Denial of Service (DoS) — Junos OS EvolvedCWE-20 7.5 High2022-10-18
CVE-2022-22246 Junos OS: PHP file inclusion vulnerability in J-Web — Junos OSCWE-829 7.5 High2022-10-18
CVE-2022-22245 Junos OS: Path traversal vulnerability in J-Web — Junos OSCWE-23 4.3 Medium2022-10-18
CVE-2022-22244 Junos OS: Unauthenticated XPath Injection vulnerability in J-Web — Junos OSCWE-91 5.3 Medium2022-10-18
CVE-2022-22243 Junos OS: XPath Injection vulnerability in J-Web — Junos OSCWE-20 4.3 Medium2022-10-18
CVE-2022-22242 Junos OS: Cross-site Scripting (XSS) vulnerability in J-Web — Junos OSCWE-79 6.1 Medium2022-10-18
CVE-2022-22241 Junos OS: Vulnerability in J-Web may allow deserialization without authentication — Junos OSCWE-20 8.1 High2022-10-18
CVE-2022-22240 Junos OS and Junos OS Evolved: An rpd memory leak might be observed while running a specific cli command in a RIB sharding scenario — Junos OS 5.5 Medium2022-10-18
CVE-2022-22239 Junos OS Evolved: The ssh CLI command always runs as root which can lead to privilege escalation — Junos OS EvolvedCWE-250 8.2 High2022-10-18
CVE-2022-22238 Junos OS and Junos OS Evolved: The rpd process will crash when a malformed incoming RESV message is processed — Junos OSCWE-754 5.3 Medium2022-10-18

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.