Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2022-01-19 CVE-2022-22179 Improper Input Validation vulnerability in Juniper Junos
A Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS).
low complexity
juniper CWE-20
6.5
2022-01-19 CVE-2022-22180 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the processing of specific IPv6 packets on certain EX Series devices may lead to exhaustion of DMA memory causing a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5
2021-10-19 CVE-2021-0296 Cleartext Transmission of Sensitive Information vulnerability in Juniper Ctpview 7.3/9.1
The Juniper Networks CTPView server is not enforcing HTTP Strict Transport Security (HSTS).
network
high complexity
juniper CWE-319
7.4
2021-10-19 CVE-2021-0297 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos OS Evolved 20.3/20.4/21.1
A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled.
network
low complexity
juniper CWE-755
6.5
2021-10-19 CVE-2021-0298 Race Condition vulnerability in Juniper Junos OS Evolved
A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial of Service (DoS) condition.
local
high complexity
juniper CWE-362
4.7
2021-10-19 CVE-2021-0299 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos 19.4/20.1/20.2
An Improper Handling of Exceptional Conditions vulnerability in the processing of a transit or directly received malformed IPv6 packet in Juniper Networks Junos OS results in a kernel crash, causing the device to restart, leading to a Denial of Service (DoS).
network
low complexity
juniper CWE-755
7.5
2021-10-19 CVE-2021-31349 Unspecified vulnerability in Juniper 128 Technology Session Smart Router Firmware
The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code.
network
low complexity
juniper
critical
9.8
2021-10-19 CVE-2021-31350 Improper Privilege Management vulnerability in Juniper Junos and Junos OS Evolved
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system.
network
low complexity
juniper CWE-269
8.8
2021-10-19 CVE-2021-31351 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5
2021-10-19 CVE-2021-31352 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Juniper Session and Resource Control
An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information.
network
low complexity
juniper CWE-327
5.3