Vulnerabilities > Juniper > Junos > 20.4

DATE CVE VULNERABILITY TITLE RISK
2022-04-14 CVE-2022-22186 Improper Initialization vulnerability in Juniper Junos
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on EX4650 devices, packets received on the management interface (em0) but not destined to the device, may be improperly forwarded to an egress interface, instead of being discarded.
network
low complexity
juniper CWE-665
6.4
2022-04-14 CVE-2022-22191 Resource Exhaustion vulnerability in Juniper Junos
A Denial of Service (DoS) vulnerability in the processing of a flood of specific ARP traffic in Juniper Networks Junos OS on the EX4300 switch, sent from the local broadcast domain, may allow an unauthenticated network-adjacent attacker to trigger a PFEMAN watchdog timeout, causing the Packet Forwarding Engine (PFE) to crash and restart.
low complexity
juniper CWE-400
6.1
2022-04-14 CVE-2022-22193 Improper Handling of Unexpected Data Type vulnerability in Juniper Junos and Junos OS Evolved
An Improper Handling of Unexpected Data Type vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS).
4.7
2022-04-14 CVE-2022-22196 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker with an established ISIS adjacency to cause a Denial of Service (DoS).
low complexity
juniper CWE-754
3.3
2022-04-14 CVE-2022-22198 Access of Uninitialized Pointer vulnerability in Juniper Junos 20.4/21.1/21.2
An Access of Uninitialized Pointer vulnerability in the SIP ALG of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS).
network
juniper CWE-824
7.1
2022-03-23 CVE-2021-25220 HTTP Request Smuggling vulnerability in multiple products
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL.
network
low complexity
isc fedoraproject netapp siemens juniper CWE-444
6.8
2022-01-19 CVE-2022-22156 Man-in-the-Middle vulnerability in Juniper Junos
An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an attacker to perform Person-in-the-Middle (PitM) attacks when a system script is fetched from a remote source at a specified HTTPS URL, which may compromise the integrity and confidentiality of the device.
network
juniper CWE-300
5.8
2022-01-19 CVE-2022-22157 Incorrect Authorization vulnerability in Juniper Junos
A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device.
network
juniper CWE-863
5.8
2022-01-19 CVE-2022-22160 Unchecked Error Condition vulnerability in Juniper Junos
An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS).
2.9
2022-01-19 CVE-2022-22161 Resource Exhaustion vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port.
network
low complexity
juniper CWE-400
5.0