Vulnerabilities > Juniper > Junos

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31373 Cross-site Scripting vulnerability in Juniper Junos
A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts.
network
low complexity
juniper CWE-79
5.4
2021-10-19 CVE-2021-31374 Unspecified vulnerability in Juniper Junos
On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS).
network
low complexity
juniper
7.5
2021-10-19 CVE-2021-31375 Unspecified vulnerability in Juniper Junos
An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI), allows an attacker to send a specific BGP update which may cause RPKI policy-checks to be bypassed.
network
low complexity
juniper
5.3
2021-10-19 CVE-2021-31376 Improper Input Validation vulnerability in Juniper Junos 18.4
An Improper Input Validation vulnerability in Packet Forwarding Engine manager (FXPC) process of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending specific DHCPv6 packets to the device and crashing the FXPC service.
network
low complexity
juniper CWE-20
7.5
2021-10-19 CVE-2021-31377 Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Junos
An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the filesystem of Junos OS allows a local authenticated attacker to cause routing process daemon (RPD) to crash and restart, causing a Denial of Service (DoS).
local
low complexity
juniper CWE-732
5.5
2021-10-19 CVE-2021-31378 Missing Release of Resource after Effective Lifetime vulnerability in Juniper Junos
In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be forced into a "Terminating" state by an attacker who is able to send spoofed messages appearing to originate from trusted RADIUS server(s) destined to the device in response to the subscriber's request.
network
low complexity
juniper CWE-772
7.5
2021-10-19 CVE-2021-31379 Unspecified vulnerability in Juniper Junos
An Incorrect Behavior Order vulnerability in the MAP-E automatic tunneling mechanism of Juniper Networks Junos OS allows an attacker to send certain malformed IPv4 or IPv6 packets to cause a Denial of Service (DoS) to the PFE on the device which is disabled as a result of the processing of these packets.
network
low complexity
juniper
7.5
2021-10-19 CVE-2021-31382 Race Condition vulnerability in Juniper Junos
On PTX1000 System, PTX10002-60C System, after upgrading to an affected release, a Race Condition vulnerability between the chassis daemon (chassisd) and firewall process (dfwd) of Juniper Networks Junos OS, may update the device's interfaces with incorrect firewall filters.
network
high complexity
juniper CWE-362
critical
9.0
2021-10-19 CVE-2021-31383 Out-of-bounds Write vulnerability in Juniper Junos and Junos OS Evolved
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS).
network
low complexity
juniper CWE-787
7.5
2021-10-19 CVE-2021-31384 Missing Authorization vulnerability in Juniper Junos 20.4/21.1
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management configuration and filter rules which may otherwise protect access to J-Web.
network
low complexity
juniper CWE-862
critical
10.0