Latest CVE Feed
-
7.5
HIGHCVE-2018-0030
Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. By continuously sending specific MPLS packets, an attacker can repeatedly crash the line cards or PTX1K causing a sustained Denial of... Read more
Affected Products : junos- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0029
While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affects Junos OS 15.1 and later releases, and affects both ... Read more
- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-0027
Receipt of a crafted or malformed RSVP PATH message may cause the routing protocol daemon (RPD) to hang or crash. When RPD is unavailable, routing updates cannot be processed which can lead to an extended network outage. If RSVP is not enabled on an inter... Read more
Affected Products : junos- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-0026
After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, ... Read more
Affected Products : junos- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2018-0025
When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS req... Read more
- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-0024
An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.... Read more
- Published: Jul. 11, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2018-0023
JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure f... Read more
Affected Products : jsnapy- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-0022
A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform dependent.... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-0021
If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys ... Read more
Affected Products : junos- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-0020
Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. Receipt of a repeated malformed BGP UPDATEs can result in an extended denial of service condition for the device. This ma... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2018-0019
A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt ... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-0018
On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other interna... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-0017
A vulnerability in the Network Address Translation - Protocol Translation (NAT-PT) feature of Junos OS on SRX series devices may allow a certain valid IPv6 packet to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended de... Read more
Affected Products : junos- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-0016
Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram ... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-0015
A malicious user with unrestricted access to the AppFormix application management platform may be able to access a Python debug console and execute system commands with root privilege. The AppFormix Agent exposes the debug console on a host where AppFormi... Read more
Affected Products : appformix- Published: Feb. 22, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0014
Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper ... Read more
Affected Products : screenos- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0013
A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-0012
Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2018-0011
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos ... Read more
Affected Products : junos_space- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0010
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Securi... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024