Latest CVE Feed
-
8.8
HIGHCVE-2018-0021
If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys ... Read more
Affected Products : junos- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-0020
Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. Receipt of a repeated malformed BGP UPDATEs can result in an extended denial of service condition for the device. This ma... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2018-0019
A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt ... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-0018
On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other interna... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-0017
A vulnerability in the Network Address Translation - Protocol Translation (NAT-PT) feature of Junos OS on SRX series devices may allow a certain valid IPv6 packet to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended de... Read more
Affected Products : junos- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-0016
Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram ... Read more
- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-0015
A malicious user with unrestricted access to the AppFormix application management platform may be able to access a Python debug console and execute system commands with root privilege. The AppFormix Agent exposes the debug console on a host where AppFormi... Read more
Affected Products : appformix- Published: Feb. 22, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0014
Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper ... Read more
Affected Products : screenos- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0013
A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-0012
Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2018-0011
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos ... Read more
Affected Products : junos_space- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0010
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Securi... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2018-0009
On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the dev... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2018-0008
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scr... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2018-0007
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruptio... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0006
A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caused by... Read more
Affected Products : junos- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-0005
QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forward traffic instead of dropping traffic. This can lead to denials of services or other unintended conditions. Affected releases are Juniper Networks Junos O... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2018-0004
A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. Th... Read more
Affected Products : junos- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-0003
A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a de... Read more
Affected Products : junos- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2018-0002
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated cr... Read more
- Published: Jan. 10, 2018
- Modified: Nov. 21, 2024