Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2024-39561 Junos OS: SRX4600, SRX5000 Series: TCP packets with SYN/FIN or SYN/RST are transferred after enabling no-syn-check with Express Path — Junos OSCWE-754 5.8 Medium2024-07-10
CVE-2024-39560 Junos OS and Junos OS Evolved: Memory leak due to RSVP neighbor persistent error leading to kernel crash — Junos OSCWE-755 6.5 Medium2024-07-10
CVE-2024-39559 Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled — Junos OS EvolvedCWE-754 5.9 Medium2024-07-10
CVE-2024-39558 Junos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR — Junos OSCWE-252 6.5 Medium2024-07-10
CVE-2024-39557 Junos OS Evolved: MAC table changes cause a memory leak — Junos OS EvolvedCWE-400 6.5 Medium2024-07-10
CVE-2024-39556 Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow — Junos OSCWE-121 6.4 Medium2024-07-10
CVE-2024-39555 Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP update causes the session to reset — Junos OSCWE-755 7.5 High2024-07-10
CVE-2024-39554 Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash — Junos OSCWE-362 5.9 Medium2024-07-10
CVE-2024-21586 Junos OS: SRX Series and NFX Series: Specific valid traffic leads to a PFE crash — Junos OSCWE-754 7.5 High2024-07-01
CVE-2024-2973 Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed — Session Smart RouterCWE-288 10.0 Critical2024-06-27
CVE-2024-30380 Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV — Junos OSCWE-755 6.5 Medium2024-04-16
CVE-2024-30378 Junos OS: MX Series: bbe-smgd process crash upon execution of specific CLI commands — Junos OSCWE-416 5.5 Medium2024-04-16
CVE-2024-30403 Junos OS Evolved: When MAC learning happens, and an interface gets flapped, the PFE crashes — Junos OS EvolvedCWE-476 6.5 Medium2024-04-12
CVE-2024-30402 Junos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a specific subscription — Junos OSCWE-754 5.9 Medium2024-04-12
CVE-2024-30401 Junos OS: MX Series and EX9200-15C: Stack-based buffer overflow in aftman — Junos OSCWE-125 5.9 Medium2024-04-12
CVE-2024-30398 Junos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an eventual PFE crash — Junos OSCWE-119 7.5 High2024-04-12
CVE-2024-30397 Junos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process — Junos OSCWE-754 7.5 High2024-04-12
CVE-2024-30391 Junos OS: MX Series with SPC3, and SRX Series: When IPsec authentication is configured with "hmac-sha-384" and "hmac-sha-512" no authentication of traffic is performed — Junos OSCWE-306 4.8 Medium2024-04-12
CVE-2024-30390 Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced — Junos OS EvolvedCWE-307 5.3 Medium2024-04-12
CVE-2024-30389 Junos OS: EX4300 Series: Firewall filter not blocking egress traffic — Junos OSCWE-696 5.8 Medium2024-04-12
CVE-2024-30386 Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash — Junos OSCWE-416 5.3 Medium2024-04-12
CVE-2024-30384 Junos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur — Junos OSCWE-754 5.5 Medium2024-04-12
CVE-2024-30382 Junos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured — Junos OSCWE-755 7.5 High2024-04-12
CVE-2024-30387 Junos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash — Junos OSCWE-820 6.5 Medium2024-04-12
CVE-2024-30388 Junos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps — Junos OS 6.5 Medium2024-04-12
CVE-2024-30392 Junos OS: MX Series with SPC3 and MS-MPC/-MIC: When URL filtering is enabled and a specific URL request is received a flowd crash occurs — Junos OSCWE-121 7.5 High2024-04-12
CVE-2024-30394 Junos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash — Junos OSCWE-121 7.5 High2024-04-12
CVE-2024-30395 Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash — Junos OSCWE-1287 7.5 High2024-04-12
CVE-2024-30405 Junos OS: SRX 5000 Series with SPC2: Processing of specific crafted packets when ALG is enabled causes a transit traffic Denial of Service — Junos OSCWE-131 7.5 High2024-04-12
CVE-2024-30406 Junos OS Evolved: ACX Series with Paragon Active Assurance Test Agent: A local high privileged attacker can recover other administrators credentials — Junos OS EvolvedCWE-313 5.5 Medium2024-04-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.