Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2022-22237 Junos OS: Peers not configured for TCP-AO can establish a BGP or LDP session even if authentication is configured locally — Junos OSCWE-287 6.5 Medium2022-10-18
CVE-2022-22236 Junos OS: SRX Series and MX Series: When specific valid SIP packets are received the PFE will crash — Junos OSCWE-824 7.5 High2022-10-18
CVE-2022-22235 Junos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed — Junos OSCWE-754 5.9 Medium2022-10-18
CVE-2022-22234 Junos OS: EX2300 and EX3400 Series: One of more SFPs might become unavailable when the system is very busy — Junos OSCWE-1250 5.5 Medium2022-10-18
CVE-2022-22233 Junos OS and Junos OS Evolved: In an SR to LDP interworking scenario, with SRMS, when a specific low privileged command is issued on an ABR rpd will crash — Junos OSCWE-690 5.5 Medium2022-10-18
CVE-2022-22232 SRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific traffic is processed the PFE will crash — Junos OSCWE-476 7.5 High2022-10-18
CVE-2022-22231 SRX Series: If UTM Enhanced Content Filtering and AntiVirus are enabled, and specific traffic is processed the PFE will crash — Junos OSCWE-690 7.5 High2022-10-18
CVE-2022-22230 Junos OS and Junos OS Evolved: RPD crash upon receipt of specific OSPFv3 LSAs — Junos OSCWE-20 6.5 Medium2022-10-18
CVE-2022-22229 Paragon Active Assurance (Formerly Netrounds): Stored Cross-site Scripting (XSS) vulnerability in web administration — Paragon Active Assurance (Formerly Netrounds)CWE-79 8.4 High2022-10-18
CVE-2022-22228 Junos OS: IPv6 OAM SRv6 network-enabled devices are vulnerable to Denial of Service (DoS) due to RPD memory leak upon receipt of specific a IPv6 packet — Junos OSCWE-1287 7.5 High2022-10-18
CVE-2022-22227 Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization — Junos OS EvolvedCWE-754 5.3 Medium2022-10-18
CVE-2022-22226 Junos OS: EX4300-MP, EX4600, QFX5000 Series: In VxLAN scenarios specific packets processed cause a memory leak leading to a PFE crash — Junos OSCWE-789 6.5 Medium2022-10-18
CVE-2022-22225 Junos OS and Junos OS Evolved: In a BGP multipath scenario, when one of the contributing routes is flapping often and rapidly, rpd may crash — Junos OS 5.9 Medium2022-10-18
CVE-2022-22224 Junos OS and Junos OS Evolved: PPMD goes into infinite loop upon receipt of malformed OSPF TLV — Junos OSCWE-703 6.5 Medium2022-10-18
CVE-2022-22223 Junos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted packets multiple interfaces in LAG configurations may detach. — Junos OSCWE-1285 6.5 Medium2022-10-18
CVE-2022-22220 Junos OS and Junos OS Evolved: Due to a race condition the rpd process can crash upon receipt of a BGP update message containing flow spec route — Junos OSCWE-367 5.9 Medium2022-10-18
CVE-2022-22219 Junos OS and Junos OS Evolved: RPD core upon receipt of a specific EVPN route by a BGP route reflector in an EVPN environment — Junos OSCWE-241 5.9 Medium2022-10-18
CVE-2022-22218 Junos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment — Junos OS 7.5 High2022-10-18
CVE-2022-22211 Junos OS Evolved: PTX Series: Multiple FPCs become unreachable due to continuous polling of specific SNMP OID — Junos OS Evolved 7.5 High2022-10-18
CVE-2022-22208 Junos OS and Junos OS Evolved: An rpd crash can occur due to memory corruption caused by flapping BGP sessions — Junos OSCWE-416 5.9 Medium2022-10-18
CVE-2022-22201 SRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet — Junos OSCWE-1285 7.5 High2022-10-18
CVE-2022-22192 Junos OS Evolved: PTX Series: An attacker can cause a kernel panic by sending a malformed TCP packet to the device — Junos OS Evolved 7.5 High2022-10-18
CVE-2022-22221 Junos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality — Junos OS 7.8 High2022-07-20
CVE-2022-22217 Junos OS: QFX10K Series: Denial of Service (DoS) upon receipt of crafted MLD packets on multi-homing ESI in VXLAN — Junos OSCWE-754 6.1 Medium2022-07-20
CVE-2022-22216 Junos OS: PTX Series and QFX10000 Series: 'Etherleak' memory disclosure in Ethernet padding data — Junos OSCWE-200 4.3 Medium2022-07-20
CVE-2022-22215 Junos OS and Junos OS Evolved: /var/run/<pid>.env files are potentially not deleted during termination of a gRPC connection causing inode exhaustion — Junos OS 6.5 Medium2022-07-20
CVE-2022-22214 Junos OS and Junos OS Evolved: In an MPLS scenario upon receipt of a specific IPv6 packet an FPC will crash — Junos OSCWE-20 6.5 Medium2022-07-20
CVE-2022-22213 Junos OS and Junos OS Evolved: Denial of Service (DoS) vulnerability in RPD upon receipt of specific BGP update — Junos OSCWE-232 5.9 Medium2022-07-20
CVE-2022-22212 Junos OS Evolved: A high rate of specific hostbound traffic will cause unexpected hostbound traffic delays or drops — Junos OS EvolvedCWE-770 7.5 High2022-07-20
CVE-2022-22210 Junos OS: QFX5000 Series and MX Series: An l2alm crash leading to an FPC crash can be observed in VxLAN scenario — Junos OSCWE-476 6.5 Medium2022-07-20

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.