Vulnerabilities > Juniper > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-15 | CVE-2021-0205 | Unspecified vulnerability in Juniper Junos When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected traffic. | 5.8 |
2020-10-16 | CVE-2020-1689 | Unspecified vulnerability in Juniper Junos On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. low complexity juniper | 6.5 |
2020-10-16 | CVE-2020-1688 | Unspecified vulnerability in Juniper Junos On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. | 6.5 |
2020-10-16 | CVE-2020-1687 | Unspecified vulnerability in Juniper Junos On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption. low complexity juniper | 6.5 |
2020-10-16 | CVE-2020-1685 | Information Exposure Through Discrepancy vulnerability in Juniper Junos When configuring stateless firewall filters in Juniper Networks EX4600 and QFX 5000 Series devices using Virtual Extensible LAN protocol (VXLAN), the discard action will fail to discard traffic under certain conditions. | 5.8 |
2020-10-16 | CVE-2020-1682 | Improper Input Validation vulnerability in Juniper Junos An input validation vulnerability exists in Juniper Networks Junos OS, allowing an attacker to crash the srxpfe process, causing a Denial of Service (DoS) through the use of specific maintenance commands. | 5.5 |
2020-10-16 | CVE-2020-1681 | Reachable Assertion vulnerability in Juniper Junos OS Evolved Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). | 6.5 |
2020-10-16 | CVE-2020-1680 | Incorrect Calculation of Buffer Size vulnerability in Juniper Junos On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. | 5.3 |
2020-10-16 | CVE-2020-1678 | Memory Leak vulnerability in Juniper Junos and Junos OS Evolved On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. | 6.5 |
2020-10-16 | CVE-2020-1670 | Unspecified vulnerability in Juniper Junos On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. low complexity juniper | 6.5 |