Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

Junos OS — Vulnerabilities & Security Advisories 660

All 660 CVE vulnerabilities found in Junos OS, with AI-generated Chinese analysis, references, and POCs.

This page details the vulnerability aggregation for Juniper Networks’ Junos OS, focusing on Common Weakness Enumerations (CWE) associated with this specific network operating system. It serves as a centralized resource for security professionals to monitor the stability and security posture of Juniper’s flagship software suite used in routers, switches, and other enterprise infrastructure devices. The content on this page compiles historical and recent vulnerability data affecting Junos OS, encompassing a broad time range from early releases to the most current updates. The collection includes weaknesses related to memory corruption, privilege escalation, input validation failures, and security configuration bypasses. By aggregating these findings, the page aims to provide a comprehensive view of the evolving threat landscape specific to Juniper’s software environment, allowing users to see trends in how different types of weaknesses have been identified and remediated over time. Here, you can track a vendor's advisories by navigating through release notes and security bulletins linked to specific versions. You can also understand a weakness class by examining how specific CWEs manifest within the context of network device firmware and software. Additionally, the page allows you to look up a product's vulnerability history, providing insights into the frequency and severity of past security incidents. This structured approach helps administrators prioritize patching efforts and assess the risk profile of their deployed Juniper equipment without needing to sift through disjointed sources. The focus remains strictly on factual reporting of vulnerabilities to support informed decision-making regarding network security maintenance and compliance.

Vendor: Juniper Networks

CVE IDTitleCVSSSeverityPublished
CVE-2022-22201 SRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet CWE-1285 7.5 High2022-10-18
CVE-2022-22221 Junos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality 7.8 High2022-07-20
CVE-2022-22217 Junos OS: QFX10K Series: Denial of Service (DoS) upon receipt of crafted MLD packets on multi-homing ESI in VXLAN CWE-754 6.1 Medium2022-07-20
CVE-2022-22216 Junos OS: PTX Series and QFX10000 Series: 'Etherleak' memory disclosure in Ethernet padding data CWE-200 4.3 Medium2022-07-20
CVE-2022-22215 Junos OS and Junos OS Evolved: /var/run/<pid>.env files are potentially not deleted during termination of a gRPC connection causing inode exhaustion 6.5 Medium2022-07-20
CVE-2022-22214 Junos OS and Junos OS Evolved: In an MPLS scenario upon receipt of a specific IPv6 packet an FPC will crash CWE-20 6.5 Medium2022-07-20
CVE-2022-22213 Junos OS and Junos OS Evolved: Denial of Service (DoS) vulnerability in RPD upon receipt of specific BGP update CWE-232 5.9 Medium2022-07-20
CVE-2022-22210 Junos OS: QFX5000 Series and MX Series: An l2alm crash leading to an FPC crash can be observed in VxLAN scenario CWE-476 6.5 Medium2022-07-20
CVE-2022-22209 Junos OS: RIB and PFEs can get out of sync due to a memory leak caused by interface flaps or route churn CWE-401 7.5 High2022-07-20
CVE-2022-22207 Junos OS: MX Series with MPC11: In a GNF / node slicing scenario gathering AF interface statistics can lead to a kernel crash CWE-416 7.5 High2022-07-20
CVE-2022-22206 Junos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search 7.5 High2022-07-20
CVE-2022-22205 Junos OS: SRX Series: An FPC memory leak can occur in an APBR scenario CWE-401 7.5 High2022-07-20
CVE-2022-22204 Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic CWE-401 5.3 Medium2022-07-20
CVE-2022-22203 Junos OS: EX4600 Series and QFX5000 Series: Receipt of specific traffic will lead to an fxpc process crash followed by an FPC reboot CWE-697 6.5 Medium2022-07-20
CVE-2022-22202 Junos OS: PTX Series: FPCs may restart unexpectedly upon receipt of specific MPLS packets with certain multi-unit interface configurations CWE-755 6.5 Medium2022-07-20
CVE-2022-22198 Junos OS: MX MS-MPC or MS-MIC, or SRX SPC crashes if it receives a SIP message with a specific contact header format CWE-824 7.5 High2022-04-14
CVE-2022-22197 Junos OS and Junos OS Evolved: An rpd core will be observed with proxy BGP route-target filtering enabled and certain route add and delete event happening CWE-672 7.5 High2022-04-14
CVE-2022-22196 Junos OS and Junos OS Evolved: The rpd CPU spikes to 100% after a malformed ISIS TLV has been received CWE-754 6.5 Medium2022-04-14
CVE-2022-22193 Junos OS and Junos OS Evolved: In a BGP rib-sharding scenario when a certain CLI command is executed the rpd process might crash CWE-241 5.5 Medium2022-04-14
CVE-2022-22191 Junos OS: EX4300: PFE Denial of Service (DoS) upon receipt of a flood of specific ARP traffic CWE-410 6.5 Medium2022-04-14
CVE-2022-22188 Junos OS: QFX5100/QFX5110/QFX5120/QFX5200/QFX5210/EX4600/EX4650 Series: When storm control profiling is enabled and a device is under an active storm, a Heap-based Buffer Overflow in the PFE will cause a device to hang. CWE-789 7.5 High2022-04-14
CVE-2022-22186 Junos OS: EX4650 Series: Certain traffic received by the Junos OS device on the management interface may be forwarded to egress interfaces instead of discarded CWE-665 7.2 High2022-04-14
CVE-2022-22185 Junos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet CWE-754 7.5 High2022-04-14
CVE-2022-22182 Junos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session CWE-79 8.8 High2022-04-14
CVE-2022-22181 Junos OS: J-Web can be compromised through reflected XSS attacks CWE-79 8.0 High2022-04-14
CVE-2022-22180 Junos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets CWE-754 7.5 High2022-01-19
CVE-2022-22179 Junos OS: jdhcpd crashes upon receiving a specific DHCP packet 6.5 Medium2022-01-19
CVE-2022-22178 Junos OS: MX and SRX series: Flowd core observed if the SIP ALG is enabled and a specific Session Initiation Protocol (SIP) packet is received CWE-121 7.5 High2022-01-19
CVE-2022-22177 Junos OS and Junos OS Evolved: After receiving a specific number of crafted packets snmpd will segmentation fault (SIGSEGV) requiring a manual restart. 5.3 Medium2022-01-19
CVE-2022-22176 Junos OS: In a scenario with dhcp-security and option-82 configured jdhcpd crashes upon receipt of a malformed DHCP packet CWE-1286 7.4 High2022-01-19

All 660 known CVE vulnerabilities affecting Junos OS with full Chinese analysis, references, and POCs where available.