Vulnerabilities > Juniper > Medium

DATE CVE VULNERABILITY TITLE RISK
2022-04-14 CVE-2022-22191 Resource Exhaustion vulnerability in Juniper Junos
A Denial of Service (DoS) vulnerability in the processing of a flood of specific ARP traffic in Juniper Networks Junos OS on the EX4300 switch, sent from the local broadcast domain, may allow an unauthenticated network-adjacent attacker to trigger a PFEMAN watchdog timeout, causing the Packet Forwarding Engine (PFE) to crash and restart.
low complexity
juniper CWE-400
6.1
2022-04-14 CVE-2022-22193 Improper Handling of Unexpected Data Type vulnerability in Juniper Junos and Junos OS Evolved
An Improper Handling of Unexpected Data Type vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS).
4.7
2022-04-14 CVE-2022-22194 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos OS Evolved
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packetIO daemon of Juniper Networks Junos OS Evolved on PTX10003, PTX10004, and PTX10008 allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-754
5.0
2022-04-14 CVE-2022-22197 Operation on a Resource after Expiration or Release vulnerability in Juniper Junos and Junos OS Evolved
An Operation on a Resource after Expiration or Release vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker with an established BGP session to cause a Denial of Service (DoS).
network
juniper CWE-672
4.3
2022-03-23 CVE-2021-25220 HTTP Request Smuggling vulnerability in multiple products
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL.
network
low complexity
isc fedoraproject netapp siemens juniper CWE-444
6.8
2022-01-19 CVE-2022-22152 Protection Mechanism Failure vulnerability in Juniper Contrail Service Orchestration
A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system.
network
low complexity
juniper CWE-693
4.0
2022-01-19 CVE-2022-22153 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos
An Insufficient Algorithmic Complexity combined with an Allocation of Resources Without Limits or Throttling vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 allows an unauthenticated network attacker to cause latency in transit packet processing and even packet loss.
network
low complexity
juniper CWE-770
5.0
2022-01-19 CVE-2022-22154 Exposure of Resource to Wrong Sphere vulnerability in Juniper Junos
In a Junos Fusion scenario an External Control of Critical State Data vulnerability in the Satellite Device (SD) control state machine of Juniper Networks Junos OS allows an attacker who is able to make physical changes to the cabling of the device to cause a denial of service (DoS).
local
low complexity
juniper CWE-668
4.6
2022-01-19 CVE-2022-22155 Memory Leak vulnerability in Juniper Junos
An Uncontrolled Resource Consumption vulnerability in the handling of IPv6 neighbor state change events in Juniper Networks Junos OS allows an adjacent attacker to cause a memory leak in the Flexible PIC Concentrator (FPC) of an ACX5448 router.
low complexity
juniper CWE-401
6.5
2022-01-19 CVE-2022-22156 Man-in-the-Middle vulnerability in Juniper Junos
An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an attacker to perform Person-in-the-Middle (PitM) attacks when a system script is fetched from a remote source at a specified HTTPS URL, which may compromise the integrity and confidentiality of the device.
network
juniper CWE-300
5.8