Latest CVE Feed
-
6.5
MEDIUMCVE-2021-0262
Through routine static code analysis of the Juniper Networks Junos OS software codebase, the Secure Development Life Cycle team identified a Use After Free vulnerability in PFE packet processing on the QFX10002-60C switching platform. Exploitation of this... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-0261
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-0260
An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) service of Juniper Networks Junos OS leads an unauthenticated attacker being able to perform SNMP read actions, an Exposure of System Data to an Unauthorized ... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.4
HIGHCVE-2021-0259
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protecti... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-0258
A vulnerability in the forwarding of transit TCPv6 packets received on the Ethernet management interface of Juniper Networks Junos OS allows an attacker to trigger a kernel panic, leading to a Denial of Service (DoS). Continued receipt and processing of t... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0257
On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network eve... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-0256
A sensitive information disclosure vulnerability in the mosquitto message broker of Juniper Networks Junos OS may allow a locally authenticated user with shell access the ability to read portions of sensitive files, such as the master.passwd file. Since m... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-0255
A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permis... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-0254
A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-0253
NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networ... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-0252
NFX Series devices using Juniper Networks Junos OS are susceptible to a local code execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networks ... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
8.6
HIGHCVE-2021-0251
A NULL Pointer Dereference vulnerability in the Captive Portal Content Delivery (CPCD) services daemon (cpcd) of Juniper Networks Junos OS on MX Series with MS-PIC, MS-SPC3, MS-MIC or MS-MPC allows an attacker to send malformed HTTP packets to the device ... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-0250
In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific crafted B... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-0249
On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise imp... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
10.0
CRITICALCVE-2021-0248
This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Credentials in Juniper Networks Junos OS allows an attacker to take over any instance of an NFX deployment. This issue is only exploitable through administra... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2021-0247
A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback filter ... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-0246
On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, devices using tenant services on Juniper Networks Junos OS, due to incorrect default permissions assigned to tenant system administrators a tenant system administrator may inadvertently... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-0245
A Use of Hard-coded Credentials vulnerability in Juniper Networks Junos OS on Junos Fusion satellite devices allows an attacker who is local to the device to elevate their privileges and take control of the device. This issue affects: Juniper Networks Jun... Read more
Affected Products : junos- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.4
HIGHCVE-2021-0244
A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which may allow an attacker to bypass the storm-control feat... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
4.7
MEDIUMCVE-2021-0243
Improper Handling of Unexpected Data in the firewall policer of Juniper Networks Junos OS on EX4300 switches allows matching traffic to exceed set policer limits, possibly leading to a limited Denial of Service (DoS) condition. When the firewall policer d... Read more
- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024