Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2022-22209 Junos OS: RIB and PFEs can get out of sync due to a memory leak caused by interface flaps or route churn — Junos OSCWE-401 7.5 High2022-07-20
CVE-2022-22207 Junos OS: MX Series with MPC11: In a GNF / node slicing scenario gathering AF interface statistics can lead to a kernel crash — Junos OSCWE-416 7.5 High2022-07-20
CVE-2022-22206 Junos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search — Junos OS 7.5 High2022-07-20
CVE-2022-22205 Junos OS: SRX Series: An FPC memory leak can occur in an APBR scenario — Junos OSCWE-401 7.5 High2022-07-20
CVE-2022-22204 Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic — Junos OSCWE-401 5.3 Medium2022-07-20
CVE-2022-22203 Junos OS: EX4600 Series and QFX5000 Series: Receipt of specific traffic will lead to an fxpc process crash followed by an FPC reboot — Junos OSCWE-697 6.5 Medium2022-07-20
CVE-2022-22202 Junos OS: PTX Series: FPCs may restart unexpectedly upon receipt of specific MPLS packets with certain multi-unit interface configurations — Junos OSCWE-755 6.5 Medium2022-07-20
CVE-2022-22198 Junos OS: MX MS-MPC or MS-MIC, or SRX SPC crashes if it receives a SIP message with a specific contact header format — Junos OSCWE-824 7.5 High2022-04-14
CVE-2022-22197 Junos OS and Junos OS Evolved: An rpd core will be observed with proxy BGP route-target filtering enabled and certain route add and delete event happening — Junos OSCWE-672 7.5 High2022-04-14
CVE-2022-22196 Junos OS and Junos OS Evolved: The rpd CPU spikes to 100% after a malformed ISIS TLV has been received — Junos OSCWE-754 6.5 Medium2022-04-14
CVE-2022-22195 Junos OS Evolved: Specific packets reaching the RE lead to a counter overflow and eventually a crash — Junos OS EvolvedCWE-911 7.5 High2022-04-14
CVE-2022-22194 Junos OS Evolved: PTX series: An attacker sending a crafted GRE packet will cause the PFE to restart — Junos OS EvolvedCWE-754 7.5 High2022-04-14
CVE-2022-22193 Junos OS and Junos OS Evolved: In a BGP rib-sharding scenario when a certain CLI command is executed the rpd process might crash — Junos OSCWE-241 5.5 Medium2022-04-14
CVE-2022-22191 Junos OS: EX4300: PFE Denial of Service (DoS) upon receipt of a flood of specific ARP traffic — Junos OSCWE-410 6.5 Medium2022-04-14
CVE-2022-22190 Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL — Paragon Active AssuranceCWE-284 7.4 High2022-04-14
CVE-2022-22189 Contrail Service Orchestration: An authenticated local user may have their permissions elevated via the device via management interface without authentication — Contrail Service OrchestrationCWE-288 7.3 High2022-04-14
CVE-2022-22188 Junos OS: QFX5100/QFX5110/QFX5120/QFX5200/QFX5210/EX4600/EX4650 Series: When storm control profiling is enabled and a device is under an active storm, a Heap-based Buffer Overflow in the PFE will cause a device to hang. — Junos OSCWE-789 7.5 High2022-04-14
CVE-2022-22187 JIMS: Local Privilege Escalation vulnerability via repair functionality — Juniper Identity Management Service (JIMS)CWE-269 7.8 High2022-04-14
CVE-2022-22186 Junos OS: EX4650 Series: Certain traffic received by the Junos OS device on the management interface may be forwarded to egress interfaces instead of discarded — Junos OSCWE-665 7.2 High2022-04-14
CVE-2022-22185 Junos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet — Junos OSCWE-754 7.5 High2022-04-14
CVE-2022-22183 Junos OS Evolved: A remote attacker may cause a CPU Denial of Service by sending genuine traffic to a device on a specific IPv4 port. — Junos OS Evolved 7.5 High2022-04-14
CVE-2022-22182 Junos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session — Junos OSCWE-79 8.8 High2022-04-14
CVE-2022-22181 Junos OS: J-Web can be compromised through reflected XSS attacks — Junos OSCWE-79 8.0 High2022-04-14
CVE-2022-22180 Junos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets — Junos OSCWE-754 7.5 High2022-01-19
CVE-2022-22179 Junos OS: jdhcpd crashes upon receiving a specific DHCP packet — Junos OS 6.5 Medium2022-01-19
CVE-2022-22178 Junos OS: MX and SRX series: Flowd core observed if the SIP ALG is enabled and a specific Session Initiation Protocol (SIP) packet is received — Junos OSCWE-121 7.5 High2022-01-19
CVE-2022-22177 Junos OS and Junos OS Evolved: After receiving a specific number of crafted packets snmpd will segmentation fault (SIGSEGV) requiring a manual restart. — Junos OS 5.3 Medium2022-01-19
CVE-2022-22176 Junos OS: In a scenario with dhcp-security and option-82 configured jdhcpd crashes upon receipt of a malformed DHCP packet — Junos OSCWE-1286 7.4 High2022-01-19
CVE-2022-22175 Junos OS: MX Series and SRX Series: The flowd daemon will crash if the SIP ALG is enabled and specific SIP messages are processed — Junos OSCWE-667 7.5 High2022-01-19
CVE-2022-22174 Junos OS: QFX5000 Series, EX4600: Device may run out of memory, causing traffic loss, upon receipt of specific IPv6 packets — Junos OSCWE-755 7.5 High2022-01-19

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.