Vulnerabilities > Juniper > Junos > 18.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-04-22 | CVE-2021-0228 | Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos 15.1/17.3 An improper check for unusual or exceptional conditions vulnerability in Juniper Networks MX Series platforms with Trio-based MPC (Modular Port Concentrator) deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, may allow an attacker sending specific Layer 2 traffic to cause Distributed Denial of Service (DDoS) protection to trigger unexpectedly, resulting in traffic impact. | 3.3 |
2021-04-22 | CVE-2021-0224 | Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos A vulnerability in the handling of internal resources necessary to bring up a large number of Layer 2 broadband remote access subscriber (BRAS) nodes in Juniper Networks Junos OS can cause the Access Node Control Protocol daemon (ANCPD) to crash and restart, leading to a Denial of Service (DoS) condition. | 3.3 |
2021-04-22 | CVE-2021-0214 | Improper Input Validation vulnerability in Juniper Junos 17.3/17.4/18.1 A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interruption, and a Denial of Service (DoS) condition. | 3.3 |
2021-01-15 | CVE-2021-0223 | Improper Privilege Management vulnerability in Juniper Junos A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS may allow a locally authenticated shell user to escalate privileges and execute arbitrary commands as root. | 7.2 |
2021-01-15 | CVE-2021-0222 | Unspecified vulnerability in Juniper Junos 14.1X53/15.1 A vulnerability in Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloads to the device. low complexity juniper | 6.1 |
2021-01-15 | CVE-2021-0221 | Infinite Loop vulnerability in Juniper Junos 17.3/17.4/18.1 In an EVPN/VXLAN scenario, if an IRB interface with a virtual gateway address (VGA) is configured on a PE, a traffic loop may occur upon receipt of specific IP multicast traffic. | 2.9 |
2021-01-15 | CVE-2021-0219 | OS Command Injection vulnerability in Juniper Junos A command injection vulnerability in install package validation subsystem of Juniper Networks Junos OS that may allow a locally authenticated attacker with privileges to execute commands with root privilege. | 7.2 |
2021-01-15 | CVE-2021-0218 | OS Command Injection vulnerability in Juniper Junos A command injection vulnerability in the license-check daemon of Juniper Networks Junos OS that may allow a locally authenticated attacker with low privileges to execute commands with root privilege. | 7.2 |
2021-01-15 | CVE-2021-0217 | Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos A vulnerability in processing of certain DHCP packets from adjacent clients on EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP local/relay server configured may lead to exhaustion of DMA memory causing a Denial of Service (DoS). | 3.3 |
2021-01-15 | CVE-2021-0215 | Memory Leak vulnerability in Juniper Junos On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart. | 2.9 |