Browse all 3 CVE security advisories affecting Juniper Networks, Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Juniper Networks develops networking equipment and security solutions for enterprises and service providers, focusing on routing, switching, and network security. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws. The company has addressed security incidents such as the 2015 ScreenOS backdoor, which allowed unauthorized access to firewalls. Currently, Juniper has three CVEs on record, reflecting ongoing security challenges. Their security posture emphasizes regular patching and vulnerability management, though historical incidents highlight the importance of diligent security practices in network infrastructure deployments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-39565 | Junos OS: J-Web: An unauthenticated, network-based attacker can perform XPATH injection attack against a device. — Junos OSCWE-643 | 8.8 | High | 2024-07-10 |
| CVE-2024-30407 | [Child CVE] JCNR and cRPD: Hard-coded SSH host keys in cRPD may allow Person-in-the-Middle (PitM) attacks — cRPDCWE-321 | 8.1 | High | 2024-04-12 |
| CVE-2023-4481 | Junos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481) — Junos OSCWE-20 | 7.5 | High | 2023-08-31 |
This page lists every published CVE security advisory associated with Juniper Networks, Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.