Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2024-39546 Junos OS Evolved: Local low-privilege user can gain root permissions leading to privilege escalation — Junos OS EvolvedCWE-862 7.3 High2024-07-11
CVE-2024-39545 Junos OS: SRX Series, MX Series with SPC3 and NFX350: When VPN tunnels parameters are not configured in specific way the iked process will crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39543 Junos OS and Junos OS Evolved: Receipt of a large RPKI-RTR PDU packet can cause rpd to crash — Junos OSCWE-120 6.5 Medium2024-07-11
CVE-2024-39542 Junos OS and Junos OS Evolved: A malformed CFM packet or specific transit traffic leads to FPC crash — Junos OS 7.5 High2024-07-11
CVE-2024-39541 Junos OS and Junos OS Evolved: Inconsistent information in the TE database can lead to an rpd crash — Junos OSCWE-755 6.5 Medium2024-07-11
CVE-2024-39540 Junos OS: SRX Series, and MX Series with SPC3: Specific valid TCP traffic can cause a pfe crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39539 Junos OS: MX Series: Continuous subscriber logins will lead to a memory leak and eventually an FPC crash — Junos OSCWE-401 5.3 Medium2024-07-11
CVE-2024-39538 Junos OS Evolved: ACX7000 Series: When multicast traffic with a specific (S,G) is received evo-pfemand crashes — Junos OS EvolvedCWE-120 6.5 Medium2024-07-11
CVE-2024-39537 Junos OS Evolved: ACX7000 Series: Ports which have been inadvertently exposed can be reached over the network — Junos OS EvolvedCWE-923 6.5 Medium2024-07-11
CVE-2024-39536 Junos OS and Junos OS Evolved: Flaps of BFD sessions with authentication cause a ppmd memory leak — Junos OSCWE-401 5.3 Medium2024-07-11
CVE-2024-39535 Junos OS Evolved: ACX 7000 Series: When specific traffic is received in a VPLS scenario evo-pfemand crashes — Junos OS EvolvedCWE-754 6.5 Medium2024-07-11
CVE-2024-39533 Junos OS: QFX5000 Series and EX4600 Series: Output firewall filter is not applied if certain match criteria are used — Junos OSCWE-447 5.8 Medium2024-07-11
CVE-2024-39532 Junos OS and Junos OS Evolved: Confidential information in logs can be accessed by another user — Junos OSCWE-532 6.3 Medium2024-07-11
CVE-2024-39531 Junos OS Evolved: ACX 7000 Series: Protocol specific DDoS configuration affects other protocols — Junos OS EvolvedCWE-229 7.5 High2024-07-11
CVE-2024-39530 Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39529 Junos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash — Junos OSCWE-134 7.5 High2024-07-11
CVE-2024-39528 Junos OS and Junos OS Evolved: Concurrent deletion of a routing-instance and receipt of an SNMP request cause an RPD crash — Junos OSCWE-416 5.7 Medium2024-07-11
CVE-2024-39524 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39523 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39522 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39521 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39520 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39519 Junos OS Evolved: ACX 7000 Series: Multicast traffic is looped in a multihoming EVPN MPLS scenario — Junos OS EvolvedCWE-754 6.5 Medium2024-07-11
CVE-2024-39518 Junos OS: MX240, MX480, MX960 platforms using MPC10E: Memory leak will be observed when subscribed to a specific subscription on Junos Telemetry Interface — Junos OSCWE-122 7.5 High2024-07-10
CVE-2024-39517 Junos OS and Junos OS Evolved: Upon processing specific L2 traffic, rpd can hang in devices with EVPN/VXLAN configured — Junos OSCWE-754 6.5 Medium2024-07-10
CVE-2024-39514 Junos OS and Junos OS Evolved: Receiving specific traffic on devices with EVPN-VPWS with IGMP-snooping enabled will cause the rpd to crash — Junos OSCWE-703 6.5 Medium2024-07-10
CVE-2024-39513 Junos OS Evolved: Execution of a specific CLI command will cause a crash in the AFT manager — Junos OS EvolvedCWE-20 5.5 Medium2024-07-10
CVE-2024-39512 Junos OS Evolved: User is not logged out when the console cable is disconnected — Junos OS EvolvedCWE-1263 6.6 Medium2024-07-10
CVE-2024-39511 Junos OS: The 802.1X Authentication Daemon crashes on running a specific command — Junos OSCWE-20 5.5 Medium2024-07-10
CVE-2024-39562 Junos OS Evolved: A high rate of SSH connections causes a Denial of Service — Junos OS EvolvedCWE-772 7.5 High2024-07-10

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.