Vulnerabilities > Juniper > Medium

DATE CVE VULNERABILITY TITLE RISK
2021-04-22 CVE-2021-0231 Path Traversal vulnerability in Juniper Junos
A path traversal vulnerability in the Juniper Networks SRX and vSRX Series may allow an authenticated J-web user to read sensitive system files.
network
low complexity
juniper CWE-22
6.8
2021-04-22 CVE-2021-0230 Memory Leak vulnerability in Juniper Junos
On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak.
network
low complexity
juniper CWE-401
5.0
2021-04-22 CVE-2021-0229 Resource Exhaustion vulnerability in Juniper Junos 16.1/16.2/17.1
An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets.
network
low complexity
juniper CWE-400
5.0
2021-04-22 CVE-2021-0227 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Juniper Junos 17.3/17.4/18.2
An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets.
network
low complexity
juniper CWE-119
5.0
2021-04-22 CVE-2021-0226 Improper Initialization vulnerability in Juniper Junos OS Evolved 20.1/20.2/20.3
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-665
5.0
2021-04-22 CVE-2021-0225 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos OS Evolved
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect.
network
low complexity
juniper CWE-754
5.0
2021-01-15 CVE-2021-0222 Unspecified vulnerability in Juniper Junos 14.1X53/15.1
A vulnerability in Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloads to the device.
low complexity
juniper
6.1
2021-01-15 CVE-2021-0211 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos 17.3/17.4/18.1
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-754
6.4
2021-01-15 CVE-2021-0210 Information Exposure vulnerability in Juniper Junos
An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session.
network
low complexity
juniper CWE-200
5.0
2021-01-15 CVE-2021-0209 Access of Uninitialized Pointer vulnerability in Juniper Junos OS Evolved 19.4/20.1
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS).
5.7