Vulnerabilities > Juniper > Junos > Medium

DATE CVE VULNERABILITY TITLE RISK
2021-04-22 CVE-2021-0214 Improper Input Validation vulnerability in Juniper Junos
A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interruption, and a Denial of Service (DoS) condition.
low complexity
juniper CWE-20
6.5
2021-01-15 CVE-2021-0221 Infinite Loop vulnerability in Juniper Junos
In an EVPN/VXLAN scenario, if an IRB interface with a virtual gateway address (VGA) is configured on a PE, a traffic loop may occur upon receipt of specific IP multicast traffic.
low complexity
juniper CWE-835
6.5
2021-01-15 CVE-2021-0219 OS Command Injection vulnerability in Juniper Junos
A command injection vulnerability in install package validation subsystem of Juniper Networks Junos OS that may allow a locally authenticated attacker with privileges to execute commands with root privilege.
local
low complexity
juniper CWE-78
6.7
2021-01-15 CVE-2021-0215 Memory Leak vulnerability in Juniper Junos
On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart.
low complexity
juniper CWE-401
6.5
2021-01-15 CVE-2021-0210 Information Exposure vulnerability in Juniper Junos
An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session.
network
high complexity
juniper CWE-200
6.8
2021-01-15 CVE-2021-0205 Unspecified vulnerability in Juniper Junos
When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected traffic.
network
low complexity
juniper
5.8
2020-10-16 CVE-2020-1689 Unspecified vulnerability in Juniper Junos
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption.
low complexity
juniper
6.5
2020-10-16 CVE-2020-1688 Unspecified vulnerability in Juniper Junos
On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services.
local
low complexity
juniper
6.5
2020-10-16 CVE-2020-1687 Unspecified vulnerability in Juniper Junos
On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption.
low complexity
juniper
6.5
2020-10-16 CVE-2020-1685 Information Exposure Through Discrepancy vulnerability in Juniper Junos
When configuring stateless firewall filters in Juniper Networks EX4600 and QFX 5000 Series devices using Virtual Extensible LAN protocol (VXLAN), the discard action will fail to discard traffic under certain conditions.
network
low complexity
juniper CWE-203
5.8