Vulnerabilities > Juniper > Junos OS Evolved > 21.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-14 | CVE-2023-36840 | Reachable Assertion vulnerability in Juniper Junos A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a specific L2VPN command is run, RPD will crash and restart. | 5.5 |
2023-07-14 | CVE-2023-36833 | Use After Free vulnerability in Juniper Junos OS Evolved A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). The process 'aftman-bt' will crash after multiple flaps on a multicast-only fast reroute (MoFRR) enabled interface. | 6.5 |
2023-06-21 | CVE-2023-0026 | Improper Input Validation vulnerability in Juniper Junos An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). | 7.5 |
2023-04-17 | CVE-2023-28978 | Insecure Default Initialization of Resource vulnerability in Juniper Junos OS Evolved An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. | 5.3 |
2023-04-17 | CVE-2023-28980 | Use After Free vulnerability in Juniper Junos and Junos OS Evolved A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). | 5.5 |
2023-04-17 | CVE-2023-28981 | Improper Input Validation vulnerability in Juniper Junos An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). | 6.5 |
2023-04-17 | CVE-2023-28982 | Memory Leak vulnerability in Juniper Junos and Junos OS Evolved A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). | 7.5 |
2023-04-17 | CVE-2023-28960 | Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Junos OS Evolved An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system. | 8.2 |
2023-04-17 | CVE-2023-28966 | Incorrect Default Permissions vulnerability in Juniper Junos OS Evolved An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. | 7.8 |
2023-04-17 | CVE-2023-28967 | Use of Uninitialized Resource vulnerability in Juniper Junos and Junos OS Evolved A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). | 7.5 |