Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

Junos OS — Vulnerabilities & Security Advisories 660

All 660 CVE vulnerabilities found in Junos OS, with AI-generated Chinese analysis, references, and POCs.

This page details the vulnerability aggregation for Juniper Networks’ Junos OS, focusing on Common Weakness Enumerations (CWE) associated with this specific network operating system. It serves as a centralized resource for security professionals to monitor the stability and security posture of Juniper’s flagship software suite used in routers, switches, and other enterprise infrastructure devices. The content on this page compiles historical and recent vulnerability data affecting Junos OS, encompassing a broad time range from early releases to the most current updates. The collection includes weaknesses related to memory corruption, privilege escalation, input validation failures, and security configuration bypasses. By aggregating these findings, the page aims to provide a comprehensive view of the evolving threat landscape specific to Juniper’s software environment, allowing users to see trends in how different types of weaknesses have been identified and remediated over time. Here, you can track a vendor's advisories by navigating through release notes and security bulletins linked to specific versions. You can also understand a weakness class by examining how specific CWEs manifest within the context of network device firmware and software. Additionally, the page allows you to look up a product's vulnerability history, providing insights into the frequency and severity of past security incidents. This structured approach helps administrators prioritize patching efforts and assess the risk profile of their deployed Juniper equipment without needing to sift through disjointed sources. The focus remains strictly on factual reporting of vulnerabilities to support informed decision-making regarding network security maintenance and compliance.

Vendor: Juniper Networks

CVE IDTitleCVSSSeverityPublished
CVE-2021-0287 Junos OS and Junos OS Evolved: RPD could crash in SR-ISIS/MPLS environment due to a flap of an ISIS link in the network CWE-754 6.5 Medium2021-07-15
CVE-2021-0285 Junos OS: QFX5000 Series and EX4600 Series: Continuous traffic destined to a device configured with MC-LAG leading to nodes losing their control connection which can impact traffic CWE-770 7.5 High2021-07-15
CVE-2021-0283 Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore) CWE-120 7.5 High2021-07-15
CVE-2021-0282 Junos OS: RPD crash while processing a specific BGP UPDATE when Multipath or add-path features are enabled CWE-754 7.5 High2021-07-15
CVE-2021-0281 Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI CWE-754 5.9 Medium2021-07-15
CVE-2021-0280 Junos OS: PTX Series, QFX10K Series: Upon receipt of specific packets BFD sessions might flap due to DDoS policer implementation in Packet Forwarding Engine CWE-665 7.5 High2021-07-15
CVE-2021-0278 Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root. CWE-20 8.8 High2021-07-15
CVE-2021-0277 Junos OS and Junos OS Evolved: LLDP Out-of-Bounds Read vulnerability in l2cpd CWE-125 8.8 High2021-07-15
CVE-2021-0275 Junos OS: J-Web: Cross-site scripting attack allows an attacker to gain control of another users session. CWE-79 8.8 High2021-04-22
CVE-2021-0272 Junos OS: QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: In EVPN-VXLAN scenarios receipt of specific genuine packets by an adjacent attacker will cause a kernel memory leak in FPC. CWE-401 6.5 Medium2021-04-22
CVE-2021-0273 Junos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces. CWE-835 5.3 Medium2021-04-22
CVE-2021-0271 Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. 6.5 Medium2021-04-22
CVE-2021-0269 Junos OS: J-Web can be compromised through reflected client-side HTTP parameter pollution attacks. CWE-233 8.8 High2021-04-22
CVE-2021-0270 Junos OS: PTX Series, QFX10K Series: A PTX/QFX FPC may restart unexpectedly with the "inline-Jflow" feature enabled on a large-scale deployment CWE-362 7.5 High2021-04-22
CVE-2021-0268 Junos OS: J-Web has an Improper Neutralization of CRLF Sequences in its HTTP Headers which allows an attacker to carry out multiple types of attacks. CWE-113 8.8 High2021-04-22
CVE-2021-0266 cSRX: Use of Hard-coded Cryptographic Keys allows an attacker to take control of the device through device management services. CWE-321 8.1 High2021-04-22
CVE-2021-0267 Junos OS: Receipt of a crafted DHCP packet will cause the jdhcpd DHCP service to core. CWE-20 7.4 High2021-04-22
CVE-2021-0263 Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow sampling is enabled CWE-19 5.9 Medium2021-04-22
CVE-2021-0264 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured CWE-703 5.9 Medium2021-04-22
CVE-2021-0262 Junos OS: QFX10002-60C: Use after free vulnerability found during static code analysis CWE-416 6.5 Medium2021-04-22
CVE-2021-0260 Junos OS: SNMP fails to properly perform authorization checks on incoming received SNMP requests. CWE-285 7.3 High2021-04-22
CVE-2021-0261 Junos OS: Denial of Service vulnerability in J-Web and web based (HTTP/HTTPS) services caused by a high number of specific requests CWE-125 7.5 High2021-04-22
CVE-2021-0259 Junos OS and Junos OS Evolved: QFX5K Series: Underlay network traffic might not be processed upon receipt of high rate of specific genuine overlay packets in VXLAN scenario CWE-755 7.4 High2021-04-22
CVE-2021-0258 Junos OS: Kernel panic upon receipt of specific TCPv6 packet on management interface CWE-362 5.9 Medium2021-04-22
CVE-2021-0256 Junos OS: mosquitto Local Privilege Escalation vulnerability in SUID binaries CWE-250 5.5 Medium2021-04-22
CVE-2021-0257 Junos OS: MX Series, EX9200 Series: Trio-based MPCs memory leak in VPLS with integrated routing and bridging (IRB) interface CWE-400 6.5 Medium2021-04-22
CVE-2021-0255 Junos OS: ethtraceroute Local Privilege Escalation vulnerability in SUID binaries CWE-250 5.5 Medium2021-04-22
CVE-2021-0253 Junos OS: NFX Series: Local Command Execution Vulnerability in JDMD Leads to Privilege Escalation CWE-77 7.8 High2021-04-22
CVE-2021-0254 Junos OS: Remote code execution vulnerability in overlayd service CWE-131 9.8 Critical2021-04-22
CVE-2021-0252 Junos OS: NFX Series: Local Code Execution Vulnerability in JDMD Leads to Privilege Escalation CWE-77 7.8 High2021-04-22

All 660 known CVE vulnerabilities affecting Junos OS with full Chinese analysis, references, and POCs where available.