Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

Junos OS Evolved — Vulnerabilities & Security Advisories 91

All 91 CVE vulnerabilities found in Junos OS Evolved, with AI-generated Chinese analysis, references, and POCs.

This page serves as a comprehensive vulnerability aggregation resource for vulnerabilities affecting the Junos OS Evolved product, specifically focusing on the Common Weakness Enumeration (CWE) taxonomy within the Juniper Networks vendor ecosystem. It collects and organizes data regarding various security flaws, ranging from buffer overflows and race conditions to information disclosures and privilege escalation errors, covering a historical time range that spans from early releases through recent updates to provide a complete lifecycle view of known issues. By consulting this resource, security professionals and system administrators can effectively track Juniper Networks’ security advisories as they are published, gain a deeper understanding of specific weakness classes and their potential impact on network infrastructure, and investigate a product’s vulnerability history to assess risk exposure over time. The aggregated data facilitates proactive threat management by highlighting patterns in software defects and enabling informed decision-making regarding patching priorities and mitigation strategies. This structured approach ensures that users have access to a centralized repository of critical security information, allowing them to correlate known weaknesses with specific software versions and understand the evolving security landscape associated with Junos OS Evolved deployments. The content is designed to support rigorous security audits and compliance checks by providing clear, verified details on reported issues without relying on speculative or unverified sources.

Vendor: Juniper Networks

CVE IDTitleCVSSSeverityPublished
CVE-2024-39523 Junos OS Evolved: CLI parameter processing issue allows privilege escalation CWE-78 7.8 High2024-07-11
CVE-2024-39522 Junos OS Evolved: CLI parameter processing issue allows privilege escalation CWE-78 7.8 High2024-07-11
CVE-2024-39521 Junos OS Evolved: CLI parameter processing issue allows privilege escalation CWE-78 7.8 High2024-07-11
CVE-2024-39520 Junos OS Evolved: CLI parameter processing issue allows privilege escalation CWE-78 7.8 High2024-07-11
CVE-2024-39519 Junos OS Evolved: ACX 7000 Series: Multicast traffic is looped in a multihoming EVPN MPLS scenario CWE-754 6.5 Medium2024-07-11
CVE-2024-39513 Junos OS Evolved: Execution of a specific CLI command will cause a crash in the AFT manager CWE-20 5.5 Medium2024-07-10
CVE-2024-39512 Junos OS Evolved: User is not logged out when the console cable is disconnected CWE-1263 6.6 Medium2024-07-10
CVE-2024-39562 Junos OS Evolved: A high rate of SSH connections causes a Denial of Service CWE-772 7.5 High2024-07-10
CVE-2024-39559 Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled CWE-754 5.9 Medium2024-07-10
CVE-2024-39557 Junos OS Evolved: MAC table changes cause a memory leak CWE-400 6.5 Medium2024-07-10
CVE-2024-30403 Junos OS Evolved: When MAC learning happens, and an interface gets flapped, the PFE crashes CWE-476 6.5 Medium2024-04-12
CVE-2024-30390 Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced CWE-307 5.3 Medium2024-04-12
CVE-2024-30406 Junos OS Evolved: ACX Series with Paragon Active Assurance Test Agent: A local high privileged attacker can recover other administrators credentials CWE-313 5.5 Medium2024-04-12
CVE-2024-21590 Junos OS Evolved: Packets which are not destined to the device can reach the RE CWE-20 5.3 Medium2024-04-12
CVE-2024-21612 Junos OS Evolved: Specific TCP traffic causes OFP core and restart of RE CWE-228 7.5 High2024-01-12
CVE-2024-21604 Junos OS Evolved: A high rate of specific traffic will cause a complete system outage CWE-770 7.5 High2024-01-12
CVE-2024-21602 Junos OS Evolved: ACX7024, ACX7100-32C and ACX7100-48L: Traffic stops when a specific IPv4 UDP packet is received by the RE CWE-476 7.5 High2024-01-12
CVE-2023-44196 Junos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach the RE CWE-754 6.5 Medium2023-10-12
CVE-2023-44195 Junos OS Evolved: Packets which are not destined to the router can reach the RE CWE-923 5.4 Medium2023-10-12
CVE-2023-44190 Junos OS Evolved: PTX10001, PTX10004, PTX10008, PTX10016: MAC address validation bypass vulnerability CWE-346 6.1 Medium2023-10-11
CVE-2023-44189 Junos OS Evolved: PTX10003 Series: MAC address validation bypass vulnerability CWE-346 6.1 Medium2023-10-11
CVE-2023-44187 Junos OS Evolved: 'file copy' CLI command can disclose password to shell users CWE-200 5.9 Medium2023-10-11
CVE-2023-36833 Junos OS Evolved: PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202: The aftman-bt process will crash in a MoFRR scenario after multiple link flaps CWE-416 6.5 Medium2023-07-14
CVE-2023-28966 Junos OS Evolved: Local low-privileged user with shell access can execute CLI commands as root CWE-276 7.8 High2023-04-17
CVE-2023-28973 Junos OS Evolved: The 'sysmanctl' shell command allows a local user to gain access to some administrative actions CWE-285 7.1 High2023-04-17
CVE-2023-28960 Junos OS Evolved: Docker repository is world-writeable, allowing low-privileged local user to inject files into Docker containers CWE-732 8.2 High2023-04-17
CVE-2023-28983 Junos OS Evolved: Shell Injection vulnerability in the gNOI server CWE-78 8.8 High2023-04-17
CVE-2023-28978 Junos OS Evolved: Read access to some confidential user information is possible CWE-1188 5.3 Medium2023-04-17
CVE-2023-22400 Junos OS Evolved: A specific SNMP GET operation and a specific CLI commands cause resources to leak and eventually the evo-pfemand process will crash CWE-400 7.5 High2023-01-12
CVE-2023-22402 Junos OS Evolved: The kernel might restart in a BGP scenario where "bgp auto-discovery" is enabled and such a neighbor flaps CWE-416 5.9 Medium2023-01-12

All 91 known CVE vulnerabilities affecting Junos OS Evolved with full Chinese analysis, references, and POCs where available.