Vulnerabilities > Juniper > Junos OS Evolved > High

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31350 Improper Privilege Management vulnerability in Juniper Junos and Junos OS Evolved
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system.
network
low complexity
juniper CWE-269
8.8
2021-10-19 CVE-2021-31353 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos and Junos OS Evolved
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of Service (DoS).
network
low complexity
juniper CWE-755
7.5
2021-10-19 CVE-2021-31354 Out-of-bounds Read vulnerability in Juniper Junos and Junos OS Evolved
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to cause a partial Denial of Service (DoS), or lead to remote code execution (RCE).
low complexity
juniper CWE-125
8.8
2021-10-19 CVE-2021-31356 OS Command Injection vulnerability in Juniper Junos OS Evolved
A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user.
local
low complexity
juniper CWE-78
7.8
2021-10-19 CVE-2021-31357 OS Command Injection vulnerability in Juniper Junos OS Evolved
A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user.
local
low complexity
juniper CWE-78
7.8
2021-10-19 CVE-2021-31358 OS Command Injection vulnerability in Juniper Junos OS Evolved
A command injection vulnerability in sftp command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user.
local
low complexity
juniper CWE-78
7.8
2021-10-19 CVE-2021-31359 Improper Privilege Management vulnerability in Juniper Junos 15.1/17.4/18.3
A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary commands as root.
local
low complexity
juniper CWE-269
7.8
2021-10-19 CVE-2021-31360 Improper Privilege Management vulnerability in Juniper Junos 15.1/17.4/18.3
An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial of Service (DoS).
local
low complexity
juniper CWE-269
7.1
2021-10-19 CVE-2021-31374 Unspecified vulnerability in Juniper Junos
On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS).
network
low complexity
juniper
7.5
2021-10-19 CVE-2021-31383 Out-of-bounds Write vulnerability in Juniper Junos and Junos OS Evolved
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS).
network
low complexity
juniper CWE-787
7.5