Vulnerabilities > Juniper > Junos OS Evolved > 18.3

DATE CVE VULNERABILITY TITLE RISK
2021-04-22 CVE-2021-0259 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos 17.3/17.4/18.1
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold.
low complexity
juniper CWE-755
3.3
2020-07-17 CVE-2020-1644 Improper Input Validation vulnerability in Juniper Junos
On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart.
network
low complexity
juniper CWE-20
5.0
2020-04-08 CVE-2020-1626 Resource Exhaustion vulnerability in Juniper Junos OS Evolved 18.3
A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash.
network
low complexity
juniper CWE-400
5.0
2020-04-08 CVE-2020-1624 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved 18.3/19.1
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files.
local
low complexity
juniper CWE-532
2.1
2020-04-08 CVE-2020-1623 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved 18.3/19.1/19.2
A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file.
local
low complexity
juniper CWE-532
2.1
2020-04-08 CVE-2020-1622 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved 18.3/19.1
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore.
local
low complexity
juniper CWE-532
2.1
2020-04-08 CVE-2020-1621 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved
A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces.
local
low complexity
juniper CWE-532
2.1
2020-04-08 CVE-2020-1620 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved
A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log.
local
low complexity
juniper CWE-532
2.1