Vulnerabilities > Juniper > Junos > 18.1

DATE CVE VULNERABILITY TITLE RISK
2021-01-15 CVE-2021-0211 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos 17.3/17.4/18.1
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-754
6.4
2021-01-15 CVE-2021-0210 Information Exposure vulnerability in Juniper Junos
An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session.
network
low complexity
juniper CWE-200
5.0
2021-01-15 CVE-2021-0208 Improper Input Validation vulnerability in Juniper Junos 15.1X49/17.3/17.4
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition.
low complexity
juniper CWE-20
3.3
2021-01-15 CVE-2021-0207 Interpretation Conflict vulnerability in Juniper Junos 17.3/17.4/18.1
An improper interpretation conflict of certain data between certain software components within the Juniper Networks Junos OS devices does not allow certain traffic to pass through the device upon receipt from an ingress interface filtering certain specific types of traffic which is then being redirected to an egress interface on a different VLAN.
network
low complexity
juniper CWE-436
5.0
2021-01-15 CVE-2021-0205 Unspecified vulnerability in Juniper Junos 17.3/17.4/18.1
When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected traffic.
network
juniper
4.3
2021-01-15 CVE-2021-0204 Improper Privilege Management vulnerability in Juniper Junos
A sensitive information disclosure vulnerability in delta-export configuration utility (dexp) of Juniper Networks Junos OS may allow a locally authenticated shell user the ability to create and read database files generated by the dexp utility, including password hashes of local users.
local
low complexity
juniper CWE-269
7.2
2021-01-15 CVE-2021-0203 Unspecified vulnerability in Juniper Junos 15.1/16.1
On Juniper Networks EX and QFX5K Series platforms configured with Redundant Trunk Group (RTG), Storm Control profile applied on the RTG interface might not take affect when it reaches the threshold condition.
network
juniper
4.3
2020-10-16 CVE-2020-1689 Unspecified vulnerability in Juniper Junos
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption.
low complexity
juniper
3.3
2020-10-16 CVE-2020-1688 Unspecified vulnerability in Juniper Junos
On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services.
local
low complexity
juniper
2.1
2020-10-16 CVE-2020-1687 Unspecified vulnerability in Juniper Junos
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption.
2.9