Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0206 Junos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL Proxy is configured. — Junos OSCWE-476 7.5 High2021-01-15
CVE-2021-0204 Junos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries — Junos OSCWE-250 7.8 High2021-01-15
CVE-2021-0202 Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and Bridging (IRB) interface is mapped to a VPLS instance or a Bridge-Domain — Junos OSCWE-400 7.5 High2021-01-15
CVE-2021-0203 Junos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trunk Group is configured — Junos OSCWE-794 8.6 High2021-01-15
CVE-2020-1689 Junos OS: EX4300-MP/EX4600/QFX5K Series: High CPU load due to receipt of specific layer 2 frames when deployed in a Virtual Chassis configuration — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1687 Junos OS: EX4300-MP/EX4600/QFX5K Series: High CPU load due to receipt of specific layer 2 frames in EVPN-VXLAN deployment. — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1688 Junos OS: SRX and NFX Series: Insufficient Web API private key protection — Junos OSCWE-359 6.5 Medium2020-10-16
CVE-2020-1685 Junos OS: EX4600, QFX5K Series: Stateless firewall filter matching 'user-vlan-id' will cause incomplete discard action — Junos OSCWE-203 5.8 Medium2020-10-16
CVE-2020-1686 Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet. — Junos OSCWE-415 7.5 High2020-10-16
CVE-2020-1683 Junos OS: Memory leak leads to kernel crash (vmcore) due to SNMP polling — Junos OSCWE-401 7.5 High2020-10-16
CVE-2020-1684 Junos OS: SRX Series: High CPU load due to processing for HTTP traffic when Application Identification is enabled. — Junos OSCWE-400 7.5 High2020-10-16
CVE-2020-1680 Junos OS: MX Series: MS-MPC/MIC might crash when processing malformed IPv6 packet in NAT64 configuration. — Junos OSCWE-131 5.3 Medium2020-10-16
CVE-2020-1681 Junos OS Evolved: Receipt of a specifically malformed NDP packet could lead to Denial of Service — Junos OS EvolvedCWE-755 6.5 Medium2020-10-16
CVE-2020-1682 Junos OS: SRX1500, vSRX, SRX4K, NFX150, NFX250: Denial of service vulnerability executing local CLI command — Junos OSCWE-20 5.5 Medium2020-10-16
CVE-2020-1678 Junos OS and Junos OS Evolved: RPD can crash due to a slow memory leak. — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1679 Junos OS: PTX/QFX Series: Kernel Routing Table (KRT) queue stuck after packet sampling a malformed packet when the tunnel-observation mpls-over-udp configuration is enabled. — Junos OSCWE-20 7.5 High2020-10-16
CVE-2020-1676 Juniper Networks Mist Cloud UI: SAML authentication response handling vulnerability. — MIST Cloud UICWE-20 7.2 High2020-10-16
CVE-2020-1677 Juniper Networks Mist Cloud UI: SAML authentication attribute elements handling vulnerability. — MIST Cloud UICWE-20 7.2 High2020-10-16
CVE-2020-1675 Juniper Networks Mist Cloud UI: SAML authentication certificate vulnerability. — MIST Cloud UICWE-299 8.3 High2020-10-16
CVE-2020-1672 Junos OS: jdhcpd process crash when processing a specific DHCPDv6 packet in DHCPv6 relay configuration. — Junos OS 7.5 High2020-10-16
CVE-2020-1673 Junos OS: Reflected Cross-site Scripting vulnerability in J-Web and web based (HTTP/HTTPS) services — Junos OSCWE-79 8.8 High2020-10-16
CVE-2020-1669 Junos OS: NFX350: Password hashes stored in world-readable format — Junos OSCWE-256 6.3 Medium2020-10-16
CVE-2020-1670 Junos OS: EX4300 Series: High CPU load due to receipt of specific IPv4 packets — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1671 Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash. — Junos OSCWE-119 7.5 High2020-10-16
CVE-2020-1667 Junos OS: MX Series: Services card might restart due to a race condition when DNS filtering is enabled. — Junos OSCWE-362 8.3 High2020-10-16
CVE-2020-1668 Junos OS: EX2300 Series: High CPU load due to receipt of specific multicast packets on layer 2 interface — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1665 Junos OS: MX series/EX9200 Series: IPv6 DDoS protection does not work as expected. — Junos OSCWE-794 5.3 Medium2020-10-16
CVE-2020-1666 Junos OS Evolved: 'console log-out-on-disconnect' fails to terminate session on console cable disconnection — Junos OS EvolvedCWE-284 6.6 Medium2020-10-16
CVE-2020-1662 Junos OS and Junos OS Evolved: RPD crash due to BGP session flapping. — Junos OSCWE-20 7.5 High2020-10-16
CVE-2020-1664 Junos OS: Buffer overflow vulnerability in device control daemon — Junos OSCWE-121 7.8 High2020-10-16

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.