Vulnerabilities > Juniper > High

DATE CVE VULNERABILITY TITLE RISK
2019-04-10 CVE-2019-0033 Resource Exhaustion vulnerability in Juniper Junos
A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS).
network
low complexity
juniper CWE-400
7.5
2019-04-10 CVE-2019-0032 Insufficiently Protected Credentials vulnerability in Juniper Service Insight and Service NOW
A password management issue exists where the Organization authentication username and password were stored in plaintext in log files.
local
low complexity
juniper CWE-522
7.8
2019-04-10 CVE-2019-0031 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos 17.4/18.1/18.1R
Specific IPv6 DHCP packets received by the jdhcpd daemon will cause a memory resource consumption issue to occur on a Junos OS device using the jdhcpd daemon configured to respond to IPv6 requests.
network
low complexity
juniper CWE-770
7.5
2019-04-10 CVE-2019-0028 Unspecified vulnerability in Juniper Junos
On Junos devices with the BGP graceful restart helper mode enabled or the BGP graceful restart mechanism enabled, a BGP session restart on a remote peer that has the graceful restart mechanism enabled may cause the local routing protocol daemon (RPD) process to crash and restart.
network
low complexity
juniper
7.5
2019-04-10 CVE-2019-0019 Unspecified vulnerability in Juniper Junos
When BGP tracing is enabled an incoming BGP message may cause the Junos OS routing protocol daemon (rpd) process to crash and restart.
network
low complexity
juniper
7.5
2019-01-16 CVE-2017-3145 Use After Free vulnerability in multiple products
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named.
network
low complexity
isc redhat debian netapp juniper CWE-416
7.5
2019-01-15 CVE-2019-0030 Use of Password Hash With Insufficient Computational Effort vulnerability in Juniper Advanced Threat Prevention Firmware 5.0.0/5.0.1/5.0.2
Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents.
network
low complexity
juniper CWE-916
7.2
2019-01-15 CVE-2019-0029 Information Exposure Through Log Files vulnerability in Juniper Advanced Threat Prevention
Juniper ATP Series Splunk credentials are logged in a file readable by authenticated local users.
local
low complexity
juniper CWE-532
7.8
2019-01-15 CVE-2019-0017 Unrestricted Upload of File with Dangerous Type vulnerability in Juniper Junos Space
The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types.
network
low complexity
juniper CWE-434
8.8
2019-01-15 CVE-2019-0014 Data Processing Errors vulnerability in Juniper Junos 17.2X75/17.4/18.2
On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down.
network
low complexity
juniper CWE-19
7.5