Vulnerabilities > Juniper > Junos > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-04-22 | CVE-2021-0214 | Improper Input Validation vulnerability in Juniper Junos A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interruption, and a Denial of Service (DoS) condition. | 6.5 |
2021-01-15 | CVE-2021-0221 | Infinite Loop vulnerability in Juniper Junos In an EVPN/VXLAN scenario, if an IRB interface with a virtual gateway address (VGA) is configured on a PE, a traffic loop may occur upon receipt of specific IP multicast traffic. | 6.5 |
2021-01-15 | CVE-2021-0219 | OS Command Injection vulnerability in Juniper Junos A command injection vulnerability in install package validation subsystem of Juniper Networks Junos OS that may allow a locally authenticated attacker with privileges to execute commands with root privilege. | 6.7 |
2021-01-15 | CVE-2021-0215 | Memory Leak vulnerability in Juniper Junos On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart. | 6.5 |
2021-01-15 | CVE-2021-0210 | Information Exposure vulnerability in Juniper Junos An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session. | 6.8 |
2021-01-15 | CVE-2021-0205 | Unspecified vulnerability in Juniper Junos When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected traffic. | 5.8 |
2020-10-16 | CVE-2020-1689 | Unspecified vulnerability in Juniper Junos On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. low complexity juniper | 6.5 |
2020-10-16 | CVE-2020-1688 | Unspecified vulnerability in Juniper Junos On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. | 6.5 |
2020-10-16 | CVE-2020-1687 | Unspecified vulnerability in Juniper Junos On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption. low complexity juniper | 6.5 |
2020-10-16 | CVE-2020-1685 | Information Exposure Through Discrepancy vulnerability in Juniper Junos When configuring stateless firewall filters in Juniper Networks EX4600 and QFX 5000 Series devices using Virtual Extensible LAN protocol (VXLAN), the discard action will fail to discard traffic under certain conditions. | 5.8 |