Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2020-10-16 CVE-2020-1668 Unspecified vulnerability in Juniper Junos
On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption.
low complexity
juniper
6.5
2020-10-16 CVE-2020-1667 Race Condition vulnerability in Juniper Junos
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition.
network
low complexity
juniper CWE-362
8.3
2020-10-16 CVE-2020-1666 Insufficient Session Expiration vulnerability in Juniper Junos OS Evolved
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected.
low complexity
juniper CWE-613
6.6
2020-10-16 CVE-2020-1665 Unspecified vulnerability in Juniper Junos
On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition.
network
low complexity
juniper
5.3
2020-10-16 CVE-2020-1664 Out-of-bounds Write vulnerability in Juniper Junos
A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege.
local
low complexity
juniper CWE-787
7.8
2020-10-16 CVE-2020-1662 Unspecified vulnerability in Juniper Junos
On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers.
network
low complexity
juniper
7.5
2020-10-16 CVE-2020-1661 Unspecified vulnerability in Juniper Junos
On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet.
network
low complexity
juniper
5.3
2020-10-16 CVE-2020-1660 Unspecified vulnerability in Juniper Junos
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart.
network
low complexity
juniper
critical
9.9
2020-10-16 CVE-2020-1657 Unspecified vulnerability in Juniper Junos
On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel.
network
low complexity
juniper
7.5
2020-10-16 CVE-2020-1656 Improper Input Validation vulnerability in Juniper Junos
The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to potentially perform a Remote Code Execution (RCE) attack on the target device.
low complexity
juniper CWE-20
8.8