Vulnerabilities > Juniper > Junos > 19.4

DATE CVE VULNERABILITY TITLE RISK
2023-04-17 CVE-2023-28976 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5
2023-04-17 CVE-2023-28979 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check.
low complexity
juniper CWE-754
4.7
2023-04-17 CVE-2023-1697 Unspecified vulnerability in Juniper Junos
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS).
low complexity
juniper
6.5
2023-04-17 CVE-2023-28959 Improper Check or Handling of Exceptional Conditions vulnerability in Juniper Junos
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on QFX10002 allows an unauthenticated, adjacent attacker on the local broadcast domain sending a malformed packet to the device, causing all PFEs other than the inbound PFE to wedge and to eventually restart, resulting in a Denial of Service (DoS) condition.
low complexity
juniper CWE-703
6.5
2023-04-17 CVE-2023-28961 Unspecified vulnerability in Juniper Junos
An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Juniper Networks Junos OS on the ACX Series devices will prevent a firewall filter with the term 'from next-header ah' from being properly installed in the packet forwarding engine (PFE).
network
low complexity
juniper
5.3
2023-04-17 CVE-2023-28962 Unrestricted Upload of File with Dangerous Type vulnerability in Juniper Junos
An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device.
network
low complexity
juniper CWE-434
critical
9.8
2023-04-17 CVE-2023-28963 Improper Authentication vulnerability in Juniper Junos
An Improper Authentication vulnerability in cert-mgmt.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to read arbitrary files from temporary folders on the device.
network
low complexity
juniper CWE-287
5.3
2023-04-17 CVE-2023-28964 Unspecified vulnerability in Juniper Junos
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS).
network
low complexity
juniper
7.5
2023-04-17 CVE-2023-28965 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check or Handling of Exceptional Conditions within the storm control feature of Juniper Networks Junos OS allows an attacker sending a high rate of traffic to cause a Denial of Service.
network
low complexity
juniper CWE-754
7.5
2023-04-17 CVE-2023-28968 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Appid Service Sigpack, Jdpi-Decoder Engine and Junos
An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through.
network
low complexity
juniper CWE-770
5.3