Vulnerabilities > Juniper > Junos

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31384 Missing Authorization vulnerability in Juniper Junos 20.4/21.1
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management configuration and filter rules which may otherwise protect access to J-Web.
network
low complexity
juniper CWE-862
critical
10.0
2021-10-19 CVE-2021-31386 Unspecified vulnerability in Juniper Junos
A Protection Mechanism Failure vulnerability in the J-Web HTTP service of Juniper Networks Junos OS allows a remote unauthenticated attacker to perform Person-in-the-Middle (PitM) attacks against the device.
network
high complexity
juniper
5.9
2021-07-15 CVE-2021-0278 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated attacker to escalate their privileges to root over the target device.
local
low complexity
juniper CWE-20
7.8
2021-07-15 CVE-2021-0281 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-754
7.5
2021-07-15 CVE-2021-0289 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Juniper Junos
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer.
high complexity
juniper CWE-367
5.3
2021-07-15 CVE-2021-0291 Information Exposure vulnerability in Juniper Junos 15.1/17.3/17.4
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource.
network
low complexity
juniper CWE-200
6.5
2021-04-22 CVE-2021-0271 Double Free vulnerability in Juniper Junos 12.3/15.1
A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device.
low complexity
juniper CWE-415
6.5
2021-04-22 CVE-2021-0270 Use After Free vulnerability in Juniper Junos 18.1
On PTX Series and QFX10k Series devices with the "inline-jflow" feature enabled, a use after free weakness in the Packet Forwarding Engine (PFE) microkernel architecture of Juniper Networks Junos OS may allow an attacker to cause a Denial of Service (DoS) condition whereby one or more Flexible PIC Concentrators (FPCs) may restart.
network
high complexity
juniper CWE-416
5.9
2021-04-22 CVE-2021-0268 Injection vulnerability in Juniper Junos
An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication.
network
low complexity
juniper CWE-74
critical
9.3
2021-04-22 CVE-2021-0267 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashing the jdhcpd DHCP service.
low complexity
juniper CWE-20
6.5