Vulnerabilities > Juniper > Junos > 16.1x70

DATE CVE VULNERABILITY TITLE RISK
2022-01-19 CVE-2022-22156 Man-in-the-Middle vulnerability in Juniper Junos
An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an attacker to perform Person-in-the-Middle (PitM) attacks when a system script is fetched from a remote source at a specified HTTPS URL, which may compromise the integrity and confidentiality of the device.
network
juniper CWE-300
5.8
2022-01-19 CVE-2022-22160 Unchecked Error Condition vulnerability in Juniper Junos
An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS).
2.9
2022-01-19 CVE-2022-22161 Resource Exhaustion vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port.
network
low complexity
juniper CWE-400
5.0
2022-01-19 CVE-2022-22168 Improper Validation of Specified Type of Input vulnerability in Juniper Junos
An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to trigger a Missing Release of Memory after Effective Lifetime vulnerability.
low complexity
juniper CWE-1287
6.1
2022-01-19 CVE-2022-22173 Memory Leak vulnerability in Juniper Junos
A Missing Release of Memory after Effective Lifetime vulnerability in the Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS).
network
low complexity
juniper CWE-401
5.0
2021-10-19 CVE-2021-31362 Unspecified vulnerability in Juniper Junos
A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU leading to a Denial of Service (DoS) condition.
low complexity
juniper
3.3
2021-10-19 CVE-2021-31365 Resource Exhaustion vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 and EX4300 Series platforms allows an adjacent attacker sending a stream of layer 2 frames will trigger an Aggregated Ethernet (AE) interface to go down and thereby causing a Denial of Service (DoS).
2.9
2021-10-19 CVE-2021-31368 Resource Exhaustion vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port.
network
low complexity
juniper CWE-400
7.8
2021-10-19 CVE-2021-31369 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos
On MX Series platforms with MS-MPC/MS-MIC, an Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated network attacker to cause a partial Denial of Service (DoS) with a high rate of specific traffic.
network
juniper CWE-770
4.3
2021-10-19 CVE-2021-31371 Unspecified vulnerability in Juniper Junos
Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs.
network
low complexity
juniper
5.0