Vulnerabilities > Juniper > Junos OS Evolved > Low

DATE CVE VULNERABILITY TITLE RISK
2022-04-14 CVE-2022-22196 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker with an established ISIS adjacency to cause a Denial of Service (DoS).
low complexity
juniper CWE-754
3.3
2022-01-19 CVE-2022-22172 Memory Leak vulnerability in Juniper Junos
A Missing Release of Memory after Effective Lifetime vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a memory leak.
low complexity
juniper CWE-401
3.3
2021-10-19 CVE-2021-31363 Infinite Loop vulnerability in Juniper Junos and Junos OS Evolved
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps.
low complexity
juniper CWE-835
3.3
2021-10-19 CVE-2021-31362 Unspecified vulnerability in Juniper Junos
A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU leading to a Denial of Service (DoS) condition.
low complexity
juniper
3.3
2021-07-15 CVE-2021-0292 Resource Exhaustion vulnerability in Juniper Junos OS Evolved 19.4/20.1/20.2
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition.
low complexity
juniper CWE-400
3.3
2021-04-22 CVE-2021-0259 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos 17.3/17.4/18.1
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold.
low complexity
juniper CWE-755
3.3
2021-01-15 CVE-2021-0208 Improper Input Validation vulnerability in Juniper Junos 15.1X49/17.3/17.4
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition.
low complexity
juniper CWE-20
3.3
2020-10-16 CVE-2020-1678 Memory Leak vulnerability in Juniper Junos and Junos OS Evolved
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak.
2.9
2020-04-08 CVE-2020-1620 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved
A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log.
local
low complexity
juniper CWE-532
2.1
2020-04-08 CVE-2020-1621 Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved
A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces.
local
low complexity
juniper CWE-532
2.1