Vulnerabilities > Juniper > Critical

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31384 Missing Authorization vulnerability in Juniper Junos 20.4/21.1
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management configuration and filter rules which may otherwise protect access to J-Web.
network
low complexity
juniper CWE-862
critical
10.0
2021-07-15 CVE-2021-0276 Out-of-bounds Write vulnerability in Juniper Steel-Belted Radius Carrier 8.4.1/8.5.0/8.6.0
A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE).
network
low complexity
juniper CWE-787
critical
9.8
2021-04-22 CVE-2021-0268 Injection vulnerability in Juniper Junos
An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication.
network
low complexity
juniper CWE-74
critical
9.3
2021-04-22 CVE-2021-0266 Use of Hard-coded Credentials vulnerability in Juniper Junos 20.2/20.3/20.4
The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services.
network
low complexity
juniper CWE-798
critical
9.8
2021-04-22 CVE-2021-0254 Out-of-bounds Write vulnerability in Juniper Junos
A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to remote code execution (RCE).
network
low complexity
juniper CWE-787
critical
9.8
2021-04-22 CVE-2021-0249 Classic Buffer Overflow vulnerability in Juniper Junos
On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise impact the device by sending crafted packets to or through the device.
network
low complexity
juniper CWE-120
critical
9.8
2021-04-22 CVE-2021-0248 Use of Hard-coded Credentials vulnerability in Juniper Junos
This issue is not applicable to NFX NextGen Software.
network
low complexity
juniper CWE-798
critical
10.0
2021-01-15 CVE-2021-0211 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-754
critical
10.0
2020-10-16 CVE-2020-1660 Unspecified vulnerability in Juniper Junos
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart.
network
low complexity
juniper
critical
9.9
2020-07-17 CVE-2020-1654 Classic Buffer Overflow vulnerability in Juniper Junos
On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, processing a malformed HTTP message can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) Continued processing of this malformed HTTP message may result in an extended Denial of Service (DoS) condition.
network
low complexity
juniper CWE-120
critical
9.8