Vulnerabilities > Juniper > Junos

DATE CVE VULNERABILITY TITLE RISK
2021-04-22 CVE-2021-0257 Memory Leak vulnerability in Juniper Junos
On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause memory leaks in the MPC of Provider Edge (PE) devices which can cause an out of memory condition and MPC restart.
low complexity
juniper CWE-401
6.5
2021-04-22 CVE-2021-0255 Improper Privilege Management vulnerability in Juniper Junos
A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root.
local
low complexity
juniper CWE-269
7.8
2021-04-22 CVE-2021-0253 Unspecified vulnerability in Juniper Junos
NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process.
local
low complexity
juniper
7.8
2021-04-22 CVE-2021-0252 Unspecified vulnerability in Juniper Junos
NFX Series devices using Juniper Networks Junos OS are susceptible to a local code execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process.
local
low complexity
juniper
7.8
2021-04-22 CVE-2021-0249 Classic Buffer Overflow vulnerability in Juniper Junos
On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise impact the device by sending crafted packets to or through the device.
network
low complexity
juniper CWE-120
critical
9.8
2021-04-22 CVE-2021-0247 Race Condition vulnerability in Juniper Junos
A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback filter on any interfaces of a device.
network
high complexity
juniper CWE-362
5.5
2021-04-22 CVE-2021-0242 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos
A vulnerability due to the improper handling of direct memory access (DMA) buffers on EX4300 switches on Juniper Networks Junos OS allows an attacker sending specific unicast frames to trigger a Denial of Service (DoS) condition by exhausting DMA buffers, causing the FPC to crash and the device to restart.
low complexity
juniper CWE-770
6.5
2021-04-22 CVE-2021-0241 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a specific DHCPv6 packet is received, resulting in a restart of the daemon.
low complexity
juniper CWE-755
6.5
2021-04-22 CVE-2021-0240 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, the Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash if a malformed DHCPv6 packet is received, resulting in a restart of the daemon.
low complexity
juniper CWE-755
6.5
2021-04-22 CVE-2021-0237 Unspecified vulnerability in Juniper Junos
On Juniper Networks EX4300-MP Series, EX4600 Series, EX4650 Series, QFX5K Series deployed as a Virtual Chassis with a specific Layer 2 circuit configuration, Packet Forwarding Engine manager (FXPC) process may crash and restart upon receipt of specific layer 2 frames.
low complexity
juniper
6.5