Vulnerabilities > Juniper > Junos OS Evolved

DATE CVE VULNERABILITY TITLE RISK
2023-04-17 CVE-2023-28980 Use After Free vulnerability in Juniper Junos and Junos OS Evolved
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS).
local
low complexity
juniper CWE-416
5.5
2023-04-17 CVE-2023-28981 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
low complexity
juniper CWE-20
6.5
2023-04-17 CVE-2023-28982 Memory Leak vulnerability in Juniper Junos and Junos OS Evolved
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-401
7.5
2023-04-17 CVE-2023-28983 OS Command Injection vulnerability in Juniper Junos OS Evolved 21.4
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code.
network
low complexity
juniper CWE-78
8.8
2023-04-17 CVE-2023-28960 Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Junos OS Evolved
An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system.
local
low complexity
juniper CWE-732
8.2
2023-04-17 CVE-2023-28964 Unspecified vulnerability in Juniper Junos
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS).
network
low complexity
juniper
7.5
2023-04-17 CVE-2023-28966 Incorrect Default Permissions vulnerability in Juniper Junos OS Evolved
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root.
local
low complexity
juniper CWE-276
7.8
2023-04-17 CVE-2023-28967 Use of Uninitialized Resource vulnerability in Juniper Junos and Junos OS Evolved
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd).
network
low complexity
juniper CWE-908
7.5
2023-04-17 CVE-2023-28973 Improper Authentication vulnerability in Juniper Junos OS Evolved
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability.
local
low complexity
juniper CWE-287
7.1
2023-01-13 CVE-2023-22393 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos and Junos OS Evolved
An Improper Check for Unusual or Exceptional Conditions vulnerability in BGP route processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to cause Routing Protocol Daemon (RPD) crash by sending a BGP route with invalid next-hop resulting in a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5