Vulnerabilities > Juniper > Medium

DATE CVE VULNERABILITY TITLE RISK
2021-10-19 CVE-2021-31373 Cross-site Scripting vulnerability in Juniper Junos
A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts.
network
low complexity
juniper CWE-79
5.4
2021-10-19 CVE-2021-31375 Unspecified vulnerability in Juniper Junos
An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI), allows an attacker to send a specific BGP update which may cause RPKI policy-checks to be bypassed.
network
low complexity
juniper
5.3
2021-10-19 CVE-2021-31377 Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Junos
An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the filesystem of Junos OS allows a local authenticated attacker to cause routing process daemon (RPD) to crash and restart, causing a Denial of Service (DoS).
local
low complexity
juniper CWE-732
5.5
2021-10-19 CVE-2021-31380 Unspecified vulnerability in Juniper Session and Resource Control
A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to disclose sensitive information in the HTTP response which allows the attacker to obtain sensitive information.
network
low complexity
juniper
5.3
2021-10-19 CVE-2021-31386 Unspecified vulnerability in Juniper Junos
A Protection Mechanism Failure vulnerability in the J-Web HTTP service of Juniper Networks Junos OS allows a remote unauthenticated attacker to perform Person-in-the-Middle (PitM) attacks against the device.
network
high complexity
juniper
5.9
2021-09-20 CVE-2021-39532 NULL Pointer Dereference vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-476
6.5
2021-07-15 CVE-2021-0279 Use of Hard-coded Credentials vulnerability in Juniper Contrail Cloud
Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials.
network
low complexity
juniper CWE-798
5.5
2021-07-15 CVE-2021-0287 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos and Junos OS Evolved
In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS).
low complexity
juniper CWE-754
6.5
2021-07-15 CVE-2021-0288 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash and lead to a Denial of Service (DoS) condition.
low complexity
juniper CWE-754
6.5
2021-07-15 CVE-2021-0289 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Juniper Junos
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer.
high complexity
juniper CWE-367
5.3