Vulnerabilities > Juniper > Junos > 18.1

DATE CVE VULNERABILITY TITLE RISK
2021-07-15 CVE-2021-0288 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash and lead to a Denial of Service (DoS) condition.
low complexity
juniper CWE-754
3.3
2021-07-15 CVE-2021-0289 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Juniper Junos
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer.
2.9
2021-07-15 CVE-2021-0290 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos 16.1/17.1/17.3
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, causing the interface to go into a down state, resulting in a Denial of Service (DoS) condition.
low complexity
juniper CWE-755
3.3
2021-07-15 CVE-2021-0295 Incorrect Comparison vulnerability in Juniper Junos
A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) of Juniper Networks Junos OS on the QFX10K Series switches allows an attacker to trigger a packet forwarding loop, leading to a partial Denial of Service (DoS).
2.9
2021-04-22 CVE-2021-0275 Cross-site Scripting vulnerability in Juniper Junos
A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session.
network
juniper CWE-79
critical
9.3
2021-04-22 CVE-2021-0273 Infinite Loop vulnerability in Juniper Junos 15.1/15.2/16.1
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to exploit an interdependency in the PFE UCODE microcode of the Trio chipset with various line cards to cause packets destined to the devices interfaces to cause a Denial of Service (DoS) condition by looping the packet with an unreachable exit condition ('Infinite Loop').
network
low complexity
juniper CWE-835
5.0
2021-04-22 CVE-2021-0272 Memory Leak vulnerability in Juniper Junos 16.1/16.2/17.1
A kernel memory leak in QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016 devices Flexible PIC Concentrators (FPCs) on Juniper Networks Junos OS allows an attacker to send genuine packets destined to the device to cause a Denial of Service (DoS) to the device.
low complexity
juniper CWE-401
6.1
2021-04-22 CVE-2021-0270 Use After Free vulnerability in Juniper Junos 18.1
On PTX Series and QFX10k Series devices with the "inline-jflow" feature enabled, a use after free weakness in the Packet Forwarding Engine (PFE) microkernel architecture of Juniper Networks Junos OS may allow an attacker to cause a Denial of Service (DoS) condition whereby one or more Flexible PIC Concentrators (FPCs) may restart.
network
juniper CWE-416
4.3
2021-04-22 CVE-2021-0269 Unspecified vulnerability in Juniper Junos 17.4/18.1/18.2
The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web.
network
high complexity
juniper
5.1
2021-04-22 CVE-2021-0268 Injection vulnerability in Juniper Junos
An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication.
network
juniper CWE-74
5.8