Vulnerabilities > Juniper > High

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31368 Resource Exhaustion vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port.
network
low complexity
juniper CWE-400
7.5
2021-10-19 CVE-2021-31372 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated J-Web attacker to escalate their privileges to root over the target device.
network
low complexity
juniper CWE-20
8.8
2021-10-19 CVE-2021-31374 Unspecified vulnerability in Juniper Junos
On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS).
network
low complexity
juniper
7.5
2021-10-19 CVE-2021-31376 Improper Input Validation vulnerability in Juniper Junos 18.4
An Improper Input Validation vulnerability in Packet Forwarding Engine manager (FXPC) process of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending specific DHCPv6 packets to the device and crashing the FXPC service.
network
low complexity
juniper CWE-20
7.5
2021-10-19 CVE-2021-31378 Missing Release of Resource after Effective Lifetime vulnerability in Juniper Junos
In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be forced into a "Terminating" state by an attacker who is able to send spoofed messages appearing to originate from trusted RADIUS server(s) destined to the device in response to the subscriber's request.
network
low complexity
juniper CWE-772
7.5
2021-10-19 CVE-2021-31379 Unspecified vulnerability in Juniper Junos
An Incorrect Behavior Order vulnerability in the MAP-E automatic tunneling mechanism of Juniper Networks Junos OS allows an attacker to send certain malformed IPv4 or IPv6 packets to cause a Denial of Service (DoS) to the PFE on the device which is disabled as a result of the processing of these packets.
network
low complexity
juniper
7.5
2021-10-19 CVE-2021-31383 Out-of-bounds Write vulnerability in Juniper Junos and Junos OS Evolved
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved sent by a remote unauthenticated network attacker causes the RPD to crash causing a Denial of Service (DoS).
network
low complexity
juniper CWE-787
7.5
2021-10-19 CVE-2021-31385 Path Traversal vulnerability in Juniper Junos
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in J-Web of Juniper Networks Junos OS allows any low-privileged authenticated attacker to elevate their privileges to root.
network
low complexity
juniper CWE-22
8.8
2021-09-20 CVE-2021-39531 Out-of-bounds Write vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-787
8.8
2021-09-20 CVE-2021-39533 Out-of-bounds Write vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-787
8.8