Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0297 Junos OS Evolved: BGP and LDP sessions with TCP MD5 authentication established with peers not configured for authentication — Junos OS EvolvedCWE-755 6.5 Medium2021-10-19
CVE-2021-0296 CTPView: HSTS not being enforced on CTPView server. — CTPViewCWE-319 7.4 High2021-10-19
CVE-2021-0284 Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore) — Junos OSCWE-120 7.5 High2021-08-17
CVE-2021-0295 Junos OS: QFX10K Series: Denial of Service (DoS) upon receipt of DVMRP packets received on multi-homing ESI in VXLAN. — Junos OSCWE-697 6.1 Medium2021-07-15
CVE-2021-0294 Junos OS: QFX5000 Series and EX4600 Series: Enhanced storm control might not work leading to partial Denial of Service — Junos OSCWE-474 5.3 Medium2021-07-15
CVE-2021-0293 Junos OS: Out-of-memory condition and crashes can occur after executing a certain CLI command repeatedly — Junos OSCWE-401 5.5 Medium2021-07-15
CVE-2021-0292 Junos OS Evolved: Memory leak in arpd or ndp processes can lead to Denial of Service (DoS) — Junos OS EvolvedCWE-400 6.5 Medium2021-07-15
CVE-2021-0291 Junos OS and Junos OS Evolved: A vulnerability allows a network based unauthenticated attacker which sends a high rate of specific traffic to cause a partial Denial of Service — Junos OSCWE-497 6.5 Medium2021-07-15
CVE-2021-0290 Junos OS: MX Series, EX9200 Series, SRX4600: Ethernet interface vulnerable to specially crafted frames — Junos OSCWE-755 6.5 Medium2021-07-15
CVE-2021-0289 Junos OS: User-defined ARP Policer isn't applied on Aggregated Ethernet (AE) interface until firewall process is restarted — Junos OSCWE-367 6.5 Medium2021-07-15
CVE-2021-0288 Junos OS: MX Series, EX9200 Series: FPC may crash upon receipt of specific MPLS packet affecting Trio-based MPCs — Junos OSCWE-754 6.5 Medium2021-07-15
CVE-2021-0287 Junos OS and Junos OS Evolved: RPD could crash in SR-ISIS/MPLS environment due to a flap of an ISIS link in the network — Junos OSCWE-754 6.5 Medium2021-07-15
CVE-2021-0286 Junos OS Evolved: Specially crafted packets may cause the AFT manager process to crash and restart — Junos OS EvolvedCWE-703 7.5 High2021-07-15
CVE-2021-0285 Junos OS: QFX5000 Series and EX4600 Series: Continuous traffic destined to a device configured with MC-LAG leading to nodes losing their control connection which can impact traffic — Junos OSCWE-770 7.5 High2021-07-15
CVE-2021-0283 Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore) — Junos OSCWE-120 7.5 High2021-07-15
CVE-2021-0282 Junos OS: RPD crash while processing a specific BGP UPDATE when Multipath or add-path features are enabled — Junos OSCWE-754 7.5 High2021-07-15
CVE-2021-0281 Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI — Junos OSCWE-754 5.9 Medium2021-07-15
CVE-2021-0280 Junos OS: PTX Series, QFX10K Series: Upon receipt of specific packets BFD sessions might flap due to DDoS policer implementation in Packet Forwarding Engine — Junos OSCWE-665 7.5 High2021-07-15
CVE-2021-0279 Contrail Cloud: Hardcoded credentials for RabbitMQ service — Contrail CloudCWE-798 8.6 High2021-07-15
CVE-2021-0278 Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root. — Junos OSCWE-20 8.8 High2021-07-15
CVE-2021-0277 Junos OS and Junos OS Evolved: LLDP Out-of-Bounds Read vulnerability in l2cpd — Junos OSCWE-125 8.8 High2021-07-15
CVE-2021-0276 Steel-Belted Radius Carrier Edition: Remote code execution vulnerability when EAP Authentication is configured. — SBR CarrierCWE-121 9.8 Critical2021-07-15
CVE-2021-0275 Junos OS: J-Web: Cross-site scripting attack allows an attacker to gain control of another users session. — Junos OSCWE-79 8.8 High2021-04-22
CVE-2021-0272 Junos OS: QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: In EVPN-VXLAN scenarios receipt of specific genuine packets by an adjacent attacker will cause a kernel memory leak in FPC. — Junos OSCWE-401 6.5 Medium2021-04-22
CVE-2021-0273 Junos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces. — Junos OSCWE-835 5.3 Medium2021-04-22
CVE-2021-0271 Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. — Junos OS 6.5 Medium2021-04-22
CVE-2021-0269 Junos OS: J-Web can be compromised through reflected client-side HTTP parameter pollution attacks. — Junos OSCWE-233 8.8 High2021-04-22
CVE-2021-0270 Junos OS: PTX Series, QFX10K Series: A PTX/QFX FPC may restart unexpectedly with the "inline-Jflow" feature enabled on a large-scale deployment — Junos OSCWE-362 7.5 High2021-04-22
CVE-2021-0268 Junos OS: J-Web has an Improper Neutralization of CRLF Sequences in its HTTP Headers which allows an attacker to carry out multiple types of attacks. — Junos OSCWE-113 8.8 High2021-04-22
CVE-2021-0266 cSRX: Use of Hard-coded Cryptographic Keys allows an attacker to take control of the device through device management services. — Junos OSCWE-321 8.1 High2021-04-22

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.