Vulnerabilities > Juniper > Junos OS Evolved > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-13 | CVE-2023-22400 | Resource Exhaustion vulnerability in Juniper Junos OS Evolved An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS). | 7.5 |
2023-01-13 | CVE-2023-22401 | Improper Validation of Array Index vulnerability in Juniper Junos and Junos OS Evolved An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). | 7.5 |
2022-12-22 | CVE-2022-22184 | Improper Input Validation vulnerability in Juniper Junos and Junos OS Evolved An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). | 7.5 |
2022-10-18 | CVE-2022-22192 | Improper Input Validation vulnerability in Juniper Junos OS Evolved An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). | 7.5 |
2022-10-18 | CVE-2022-22211 | Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos OS Evolved A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged attacker to cause Denial of Service (DoS). | 7.5 |
2022-10-18 | CVE-2022-22239 | Improper Privilege Management vulnerability in Juniper Junos OS Evolved An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. | 8.8 |
2022-10-18 | CVE-2022-22247 | Improper Input Validation vulnerability in Juniper Junos OS Evolved 21.3/21.4/22.1 An Improper Input Validation vulnerability in ingress TCP segment processing of Juniper Networks Junos OS Evolved allows a network-based unauthenticated attacker to send a crafted TCP segment to the device, triggering a kernel panic, leading to a Denial of Service (DoS) condition. | 7.5 |
2022-10-18 | CVE-2022-22248 | Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Junos OS Evolved An Incorrect Permission Assignment vulnerability in shell processing of Juniper Networks Junos OS Evolved allows a low-privileged local user to modify the contents of a configuration file which could cause another user to execute arbitrary commands within the context of the follow-on user's session. | 7.3 |
2022-04-14 | CVE-2022-22183 | Unspecified vulnerability in Juniper Junos OS Evolved An Improper Access Control vulnerability in Juniper Networks Junos OS Evolved allows a network-based unauthenticated attacker who is able to connect to a specific open IPv4 port, which in affected releases should otherwise be unreachable, to cause the CPU to consume all resources as more traffic is sent to the port to create a Denial of Service (DoS) condition. | 7.5 |
2022-04-14 | CVE-2022-22195 | Improper Update of Reference Count vulnerability in Juniper Junos OS Evolved An Improper Update of Reference Count vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to trigger a counter overflow, eventually causing a Denial of Service (DoS). | 7.8 |