Vulnerabilities > Juniper > Junos > 20.4

DATE CVE VULNERABILITY TITLE RISK
2023-07-14 CVE-2023-36836 Unspecified vulnerability in Juniper Junos
A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, in a Multicast only Fast Reroute (MoFRR) scenario, the rpd process can crash when a a specific low privileged CLI command is executed.
local
high complexity
juniper
4.7
2023-04-17 CVE-2023-28979 Unspecified vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check.
low complexity
juniper
4.7
2023-04-17 CVE-2023-1697 Unspecified vulnerability in Juniper Junos
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS).
low complexity
juniper
6.5
2023-04-17 CVE-2023-28961 Unspecified vulnerability in Juniper Junos
An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Juniper Networks Junos OS on the ACX Series devices will prevent a firewall filter with the term 'from next-header ah' from being properly installed in the packet forwarding engine (PFE).
network
low complexity
juniper
5.3
2023-04-17 CVE-2023-28962 Unrestricted Upload of File with Dangerous Type vulnerability in Juniper Junos
An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device.
network
low complexity
juniper CWE-434
critical
9.8
2023-04-17 CVE-2023-28965 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check or Handling of Exceptional Conditions within the storm control feature of Juniper Networks Junos OS allows an attacker sending a high rate of traffic to cause a Denial of Service.
network
low complexity
juniper CWE-754
7.5
2023-01-13 CVE-2023-22398 Access of Uninitialized Pointer vulnerability in Juniper Junos 15.1/19.1/19.2
An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS).
local
low complexity
juniper CWE-824
5.5
2023-01-13 CVE-2023-22417 Memory Leak vulnerability in Juniper Junos
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-401
7.5
2022-10-18 CVE-2022-22220 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Juniper Junos
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, Junos OS Evolved allows a network-based unauthenticated attacker to cause a Denial of Service (DoS).
network
high complexity
juniper CWE-367
5.9
2022-10-18 CVE-2022-22223 Improper Input Validation vulnerability in Juniper Junos
On QFX10000 Series devices using Juniper Networks Junos OS when configured as transit IP/MPLS penultimate hop popping (PHP) nodes with link aggregation group (LAG) interfaces, an Improper Validation of Specified Index, Position, or Offset in Input weakness allows an attacker sending certain IP packets to cause multiple interfaces in the LAG to detach causing a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-20
7.5