Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2023-04-17 CVE-2023-28966 Incorrect Default Permissions vulnerability in Juniper Junos OS Evolved
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root.
local
low complexity
juniper CWE-276
7.8
2023-04-17 CVE-2023-28967 Use of Uninitialized Resource vulnerability in Juniper Junos and Junos OS Evolved
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd).
network
low complexity
juniper CWE-908
7.5
2023-04-17 CVE-2023-28968 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Appid Service Sigpack, Jdpi-Decoder Engine and Junos
An Improperly Controlled Sequential Memory Allocation vulnerability in the Juniper Networks Deep Packet Inspection-Decoder (JDPI-Decoder) Application Signature component of Junos OS's AppID service on SRX Series devices will stop the JDPI-Decoder from identifying dynamic application traffic, allowing an unauthenticated network-based attacker to send traffic to the target device using the JDPI-Decoder, designed to inspect dynamic application traffic and take action upon this traffic, to instead begin to not take action and to pass the traffic through.
network
low complexity
juniper CWE-770
5.3
2023-04-17 CVE-2023-28970 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing on the network interfaces of Juniper Networks Junos OS on JRR200 route reflector appliances allows an adjacent, network-based attacker sending a specific packet to the device to cause a kernel crash, resulting in a Denial of Service (DoS).
low complexity
juniper CWE-755
6.5
2023-04-17 CVE-2023-28971 Unspecified vulnerability in Juniper Paragon Active Assurance
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations.
network
low complexity
juniper
7.2
2023-04-17 CVE-2023-28972 Link Following vulnerability in Juniper Junos
An Improper Link Resolution Before File Access vulnerability in console port access of Juniper Networks Junos OS on NFX Series allows an attacker to bypass console access controls.
low complexity
juniper CWE-59
6.8
2023-04-17 CVE-2023-28973 Improper Authentication vulnerability in Juniper Junos OS Evolved
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability.
local
low complexity
juniper CWE-287
7.1
2023-04-17 CVE-2023-28974 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the bbe-smgd of Juniper Networks Junos OS allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
low complexity
juniper CWE-754
6.5
2023-04-17 CVE-2023-28975 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Unexpected Status Code or Return Value vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated attacker with physical access to the device to cause a Denial of Service (DoS).
low complexity
juniper CWE-754
4.6
2023-01-13 CVE-2023-22391 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos
A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K Series devices allows an unauthenticated network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-755
7.5