Vulnerabilities > Juniper > Junos > 12.3x48
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-11 | CVE-2018-0025 | Unspecified vulnerability in Juniper Junos 12.1X46/12.3X48/15.1X49 When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-the-middle attack or by authentic servers subverted by malicious actors. | 8.1 |
2018-07-11 | CVE-2018-0024 | Improper Privilege Management vulnerability in Juniper Junos An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. | 7.8 |
2018-04-11 | CVE-2018-0022 | Resource Exhaustion vulnerability in Juniper Junos A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. | 7.5 |
2018-04-11 | CVE-2018-0019 | Improper Input Validation vulnerability in Juniper Junos A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. | 5.9 |
2018-04-11 | CVE-2018-0018 | Information Exposure vulnerability in Juniper Junos 12.1X46/12.3X48/15.1X49 On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other internal devices, systems or services protected by the SRX Series device. | 5.9 |
2018-04-11 | CVE-2018-0017 | Improper Input Validation vulnerability in Juniper Junos A vulnerability in the Network Address Translation - Protocol Translation (NAT-PT) feature of Junos OS on SRX series devices may allow a certain valid IPv6 packet to crash the flowd daemon. | 6.5 |
2018-01-10 | CVE-2018-0009 | Unspecified vulnerability in Juniper Junos 12.1X46/12.3X48/15.1X49 On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. | 5.9 |
2018-01-10 | CVE-2018-0008 | Improper Authentication vulnerability in Juniper Junos An unauthenticated root login may allow upon reboot when a commit script is used. | 6.2 |
2018-01-10 | CVE-2018-0007 | Command Injection vulnerability in Juniper Junos An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. | 9.8 |
2018-01-10 | CVE-2018-0004 | Resource Exhaustion vulnerability in Juniper Junos A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. | 6.5 |