Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2022-01-19 CVE-2022-22160 Unspecified vulnerability in Juniper Junos
An Unchecked Error Condition vulnerability in the subscriber management daemon (smgd) of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to cause a crash of and thereby a Denial of Service (DoS).
low complexity
juniper
6.5
2022-01-19 CVE-2022-22161 Unspecified vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port.
network
low complexity
juniper
7.5
2022-01-19 CVE-2022-22162 Unspecified vulnerability in Juniper Junos
A Generation of Error Message Containing Sensitive Information vulnerability in the CLI of Juniper Networks Junos OS allows a locally authenticated attacker with low privileges to elevate these to the level of any other user logged in via J-Web at this time, potential leading to a full compromise of the device.
local
low complexity
juniper
7.8
2022-01-19 CVE-2022-22163 Unspecified vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS).
low complexity
juniper
6.5
2022-01-19 CVE-2022-22164 Improper Initialization vulnerability in Juniper Junos OS Evolved 20.4/21.1/21.2
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled.
network
low complexity
juniper CWE-665
5.3
2022-01-19 CVE-2022-22166 Improper Validation of Specified Quantity in Input vulnerability in Juniper Junos 20.4/21.1
An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS).
low complexity
juniper CWE-1284
6.5
2022-01-19 CVE-2022-22167 Unspecified vulnerability in Juniper Junos
A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device.
network
low complexity
juniper
critical
9.8
2022-01-19 CVE-2022-22168 Unspecified vulnerability in Juniper Junos
An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to trigger a Missing Release of Memory after Effective Lifetime vulnerability.
low complexity
juniper
6.5
2022-01-19 CVE-2022-22169 Unspecified vulnerability in Juniper Junos 15.1/18.3
An Improper Initialization vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker who sends specific packets in certain orders and at specific timings to force OSPFv3 to unexpectedly enter graceful-restart (GR helper mode) even though there is not any Grace-LSA received in OSPFv3 causing a Denial of Service (DoS).
network
high complexity
juniper
5.9
2022-01-19 CVE-2022-22170 Unspecified vulnerability in Juniper Junos
A Missing Release of Resource after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a Denial of Service (DoS) by sending specific packets over VXLAN which cause heap memory to leak and on exhaustion the PFE to reset.
network
low complexity
juniper
7.5