Vulnerabilities > Juniper > Junos OS Evolved > Medium

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31362 Unspecified vulnerability in Juniper Junos
A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU leading to a Denial of Service (DoS) condition.
low complexity
juniper
6.5
2021-10-19 CVE-2021-31363 Infinite Loop vulnerability in Juniper Junos and Junos OS Evolved
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may lead to routing protocol flaps.
low complexity
juniper CWE-835
6.5
2021-07-15 CVE-2021-0287 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos and Junos OS Evolved
In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS).
low complexity
juniper CWE-754
6.5
2021-07-15 CVE-2021-0291 Information Exposure vulnerability in Juniper Junos 15.1/17.3/17.4
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource.
network
low complexity
juniper CWE-200
6.5
2021-07-15 CVE-2021-0292 Resource Exhaustion vulnerability in Juniper Junos OS Evolved 19.4/20.1/20.2
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition.
low complexity
juniper CWE-400
6.5
2021-04-22 CVE-2021-0273 Infinite Loop vulnerability in Juniper Junos 15.1/15.2/16.1
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to exploit an interdependency in the PFE UCODE microcode of the Trio chipset with various line cards to cause packets destined to the devices interfaces to cause a Denial of Service (DoS) condition by looping the packet with an unreachable exit condition ('Infinite Loop').
network
low complexity
juniper CWE-835
5.3
2021-04-22 CVE-2021-0239 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos OS Evolved 20.4
In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash and restart, leading to a Denial of Service (DoS) condition.
low complexity
juniper CWE-754
6.5
2021-04-22 CVE-2021-0236 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos and Junos OS Evolved
Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of Service (DoS).
network
low complexity
juniper CWE-754
6.5
2021-04-22 CVE-2021-0225 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos OS Evolved
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect.
network
low complexity
juniper CWE-754
5.8
2021-01-15 CVE-2021-0209 Access of Uninitialized Pointer vulnerability in Juniper Junos OS Evolved 19.4/20.1
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS).
low complexity
juniper CWE-824
6.5