Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2023-07-14 CVE-2023-36838 Out-of-bounds Read vulnerability in Juniper Junos
An Out-of-bounds Read vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series allows a local, authenticated attacker with low privileges, to cause a Denial of Service (DoS). If a low privileged user executes a specific CLI command, flowd which is responsible for traffic forwarding in SRX crashes and generates a core dump.
local
low complexity
juniper CWE-125
5.5
2023-07-14 CVE-2023-36832 Improper Handling of Exceptional Conditions vulnerability in Juniper Junos
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series allows an unauthenticated network-based attacker to send specific packets to an Aggregated Multiservices (AMS) interface on the device, causing the packet forwarding engine (PFE) to crash, resulting in a Denial of Service (DoS).
network
low complexity
juniper CWE-755
7.5
2023-07-14 CVE-2023-36831 Improper Check or Handling of Exceptional Conditions vulnerability in Juniper Junos 22.2/22.3/22.4
An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-703
7.5
2023-06-21 CVE-2023-0026 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-20
7.5
2023-04-17 CVE-2023-28976 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5
2023-04-17 CVE-2023-28978 Insecure Default Initialization of Resource vulnerability in Juniper Junos OS Evolved
An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information.
network
low complexity
juniper CWE-1188
5.3
2023-04-17 CVE-2023-28979 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check.
low complexity
juniper CWE-754
4.7
2023-04-17 CVE-2023-28980 Use After Free vulnerability in Juniper Junos and Junos OS Evolved
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS).
local
low complexity
juniper CWE-416
5.5
2023-04-17 CVE-2023-28981 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
low complexity
juniper CWE-20
6.5
2023-04-17 CVE-2023-28982 Memory Leak vulnerability in Juniper Junos and Junos OS Evolved
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-401
7.5