Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

Found 91 results / 893Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-33783 Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftmand crashes — Junos OS EvolvedCWE-686 6.5 Medium2026-04-09
CVE-2026-33788 Junos OS Evolved: Local, authenticated attacker can gain privileged access to FPCs — Junos OS EvolvedCWE-306 7.8 High2026-04-09
CVE-2025-59969 Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will cause evo-aftmand / evo-pfemand to crash and restart — Junos OS EvolvedCWE-120 6.5 Medium2026-04-09
CVE-2026-21902 Junos OS Evolved: PTX Series: A vulnerability allows a unauthenticated, network-based attacker to execute code as root — Junos OS EvolvedCWE-732 9.8 Critical2026-02-25
CVE-2026-21911 Junos OS Evolved: Flapping management interface causes MAC learning on label-switched interfaces to stop — Junos OS EvolvedCWE-682 6.5 Medium2026-01-15
CVE-2025-60006 Junos OS Evolved: OS command injection vulnerabilities fixed — Junos OS EvolvedCWE-78 5.3 Medium2025-10-09
CVE-2025-59967 Junos OS Evolved: ACX7024, ACX7024X, ACX7100-32C, ACX7100-48L, ACX7348, ACX7509: When specific valid multicast traffic is received on the L3 interface on a vulnerable device evo-pfemand crashes and restarts — Junos OS EvolvedCWE-476 6.5 Medium2025-10-09
CVE-2025-59958 Junos OS Evolved: PTX Series: When a firewall filter rejects traffic these packets are erroneously sent to the RE — Junos OS EvolvedCWE-754 6.5 Medium2025-10-09
CVE-2025-52961 Junos OS Evolved: PTX Series except PTX10003: An unauthenticated adjacent attacker sending specific valid traffic can cause a memory leak in cfmman leading to FPC crash and restart — Junos OS EvolvedCWE-400 6.5 Medium2025-10-09
CVE-2025-52985 Junos OS Evolved: When a control-plane firewall filter refers to a prefix-list with more than 10 entries it's not matching — Junos OS EvolvedCWE-480 5.3 Medium2025-07-11
CVE-2025-52954 Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system — Junos OS EvolvedCWE-862 7.8 High2025-07-11
CVE-2025-21599 Junos OS Evolved: Receipt of specifically malformed IPv6 packets causes kernel memory exhaustion leading to Denial of Service — Junos OS EvolvedCWE-401 7.5 High2025-01-09
CVE-2024-47509 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #3 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11
CVE-2024-47508 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #2 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11
CVE-2024-47505 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #1 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11
CVE-2024-47502 Junos OS Evolved: TCP session state is not always cleared on the Routing Engine leading to DoS — Junos OS EvolvedCWE-770 7.5 High2024-10-11
CVE-2024-47498 Junos OS Evolved: QFX5000 Series: Configured MAC learning and move limits are not in effect — Junos OS Evolved 6.5 Medium2024-10-11
CVE-2024-47495 Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device. — Junos OS EvolvedCWE-639 6.7 Medium2024-10-11
CVE-2024-47490 Junos OS Evolved: ACX 7000 Series: Receipt of specific transit MPLS packets causes resources to be exhausted — Junos OS EvolvedCWE-923 8.2 High2024-10-11
CVE-2024-47489 Junos OS Evolved: ACX Series: Receipt of specific transit protocol packets is incorrectly processed by the RE — Junos OS EvolvedCWE-755 5.8 Medium2024-10-11
CVE-2024-39544 Junos OS Evolved: Low privileged local user able to view NETCONF traceoptions files — Junos OS EvolvedCWE-276 5.0 Medium2024-10-11
CVE-2024-39534 Junos OS Evolved: Connections to the network and broadcast address accepted — Junos OS EvolvedCWE-697 5.4 Medium2024-10-11
CVE-2024-39553 Junos OS Evolved: Receipt of arbitrary data when sampling service is enabled, leads to partial Denial of Service (DoS). — Junos OS EvolvedCWE-668 6.5 Medium2024-07-11
CVE-2024-39548 Junos OS Evolved: Receipt of specific packets in the aftmand process will lead to a memory leak — Junos OS EvolvedCWE-400 7.5 High2024-07-11
CVE-2024-39546 Junos OS Evolved: Local low-privilege user can gain root permissions leading to privilege escalation — Junos OS EvolvedCWE-862 7.3 High2024-07-11
CVE-2024-39538 Junos OS Evolved: ACX7000 Series: When multicast traffic with a specific (S,G) is received evo-pfemand crashes — Junos OS EvolvedCWE-120 6.5 Medium2024-07-11
CVE-2024-39537 Junos OS Evolved: ACX7000 Series: Ports which have been inadvertently exposed can be reached over the network — Junos OS EvolvedCWE-923 6.5 Medium2024-07-11
CVE-2024-39535 Junos OS Evolved: ACX 7000 Series: When specific traffic is received in a VPLS scenario evo-pfemand crashes — Junos OS EvolvedCWE-754 6.5 Medium2024-07-11
CVE-2024-39531 Junos OS Evolved: ACX 7000 Series: Protocol specific DDoS configuration affects other protocols — Junos OS EvolvedCWE-229 7.5 High2024-07-11
CVE-2024-39524 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.