Vulnerabilities > Juniper > Junos OS Evolved > High

DATE CVE VULNERABILITY TITLE RISK
2023-09-01 CVE-2023-4481 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems.
network
low complexity
juniper CWE-20
7.5
2023-06-21 CVE-2023-0026 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-20
7.5
2023-04-17 CVE-2023-28982 Memory Leak vulnerability in Juniper Junos and Junos OS Evolved
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-401
7.5
2023-04-17 CVE-2023-28983 OS Command Injection vulnerability in Juniper Junos OS Evolved 21.4
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code.
network
low complexity
juniper CWE-78
8.8
2023-04-17 CVE-2023-28960 Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Junos OS Evolved
An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged attacker to copy potentially malicious files into an existing Docker container on the local system.
local
low complexity
juniper CWE-732
8.2
2023-04-17 CVE-2023-28964 Unspecified vulnerability in Juniper Junos
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS).
network
low complexity
juniper
7.5
2023-04-17 CVE-2023-28966 Incorrect Default Permissions vulnerability in Juniper Junos OS Evolved
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root.
local
low complexity
juniper CWE-276
7.8
2023-04-17 CVE-2023-28967 Use of Uninitialized Resource vulnerability in Juniper Junos and Junos OS Evolved
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd).
network
low complexity
juniper CWE-908
7.5
2023-04-17 CVE-2023-28973 Improper Authentication vulnerability in Juniper Junos OS Evolved
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability.
local
low complexity
juniper CWE-287
7.1
2023-01-13 CVE-2023-22393 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos and Junos OS Evolved
An Improper Check for Unusual or Exceptional Conditions vulnerability in BGP route processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to cause Routing Protocol Daemon (RPD) crash by sending a BGP route with invalid next-hop resulting in a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5