Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2024-21594 Junos OS: SRX 5000 Series: Repeated execution of a specific CLI command causes a flowd crash — Junos OSCWE-122 5.5 Medium2024-01-12
CVE-2024-21591 Junos OS: SRX Series and EX Series: Security Vulnerability in J-web allows a preAuth Remote Code Execution — Junos OSCWE-787 9.8 Critical2024-01-12
CVE-2024-21589 Paragon Active Assurance Control Center: Information disclosure vulnerability — Paragon Active AssuranceCWE-284 7.4 High2024-01-12
CVE-2024-21587 Junos OS: MX Series: Memory leak in bbe-smgd process if BFD liveness detection for DHCP subscribers is enabled — Junos OSCWE-755 6.5 Medium2024-01-12
CVE-2024-21585 Junos OS and Junos OS Evolved: BGP session flaps on NSR-enabled devices can cause rpd crash — Junos OSCWE-755 5.9 Medium2024-01-12
CVE-2023-36842 Junos OS: jdhcpd will hang on receiving a specific DHCP packet — Junos OSCWE-703 6.5 Medium2024-01-12
CVE-2023-44204 Junos OS and Junos OS Evolved: The rpd will crash upon receiving a malformed BGP UPDATE message — Junos OSCWE-1286 6.5 Medium2023-10-12
CVE-2023-44203 Junos OS: QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600: Packet flooding will occur when IGMP traffic is sent to an isolated VLAN — Junos OSCWE-703 6.5 Medium2023-10-12
CVE-2023-44201 Junos OS and Junos OS Evolved: A local attacker can retrieve sensitive information and elevate privileges on the device to an authorized user. — Junos OSCWE-732 5.0 Medium2023-10-12
CVE-2023-44199 Junos OS: MX Series: In a PTP scenario a prolonged routing protocol churn can trigger an FPC reboot — Junos OSCWE-754 7.5 High2023-10-12
CVE-2023-44198 Junos OS: SRX Series and MX Series: SIP ALG doesn't drop specifically malformed retransmitted SIP packets — Junos OSCWE-754 5.8 Medium2023-10-12
CVE-2023-44197 Junos OS and Junos OS Evolved: An rpd crash may occur when BGP is processing newly learned routes — Junos OSCWE-787 7.5 High2023-10-12
CVE-2023-44196 Junos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach the RE — Junos OS EvolvedCWE-754 6.5 Medium2023-10-12
CVE-2023-44195 Junos OS Evolved: Packets which are not destined to the router can reach the RE — Junos OS EvolvedCWE-923 5.4 Medium2023-10-12
CVE-2023-44194 Junos OS: An unauthenticated attacker with local access to the device can create a backdoor with root privileges — Junos OSCWE-276 8.4 High2023-10-12
CVE-2023-44193 Junos OS: MX Series: An FPC crash is observed when CFM is enabled in a VPLS scenario and a specific LDP related command is run — Junos OSCWE-401 5.5 Medium2023-10-12
CVE-2023-44192 Junos OS: QFX5000 Series: DMA memory leak is observed when specific DHCP packets are transmitted over pseudo-VTEP — Junos OSCWE-20 7.5 High2023-10-12
CVE-2023-44191 Junos OS: QFX5000 Series and EX4000 Series: Denial of Service (DoS) on a large scale VLAN due to PFE hogging — Junos OSCWE-770 7.5 High2023-10-12
CVE-2023-44185 Junos OS and Junos OS Evolved: In an BGP scenario RPD crashes upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet — Junos OSCWE-20 7.5 High2023-10-12
CVE-2023-44184 Junos OS and Junos OS Evolved: High CPU load due to specific NETCONF command — Junos OSCWE-119 6.5 Medium2023-10-12
CVE-2023-44183 Junos OS: QFX5000 Series, EX4600 Series: In a VxLAN scenario an adjacent attacker within the VxLAN sending genuine packets may cause a DMA memory leak to occur. — Junos OSCWE-20 6.5 Medium2023-10-12
CVE-2023-44182 Junos OS and Junos OS Evolved: An Unchecked Return Value in multiple users interfaces affects confidentiality and integrity of device operations — Junos OSCWE-252 7.3 High2023-10-12
CVE-2023-44181 Junos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment — Junos OS 7.5 High2023-10-12
CVE-2023-44178 Junos OS : Stack overflow vulnerability in CLI command processing — Junos OSCWE-787 5.5 Medium2023-10-12
CVE-2023-44176 Junos OS : Stack overflow vulnerability in CLI command processing — Junos OSCWE-787 5.5 Medium2023-10-12
CVE-2023-44177 Junos OS and Junos OS Evolved: Stack overflow vulnerability in CLI command processing — Junos OSCWE-787 5.5 Medium2023-10-12
CVE-2023-44175 Junos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash — Junos OSCWE-617 6.5 Medium2023-10-12
CVE-2023-36843 Junos OS: SRX Series: The PFE will crash on receiving malformed SSL traffic when Sky ATP is enabled — Junos OSCWE-168 7.5 High2023-10-12
CVE-2023-36841 Junos OS: MX Series: Receipt of malformed TCP traffic will cause a Denial of Service — Junos OSCWE-400 7.5 High2023-10-12
CVE-2023-36839 Junos OS and Junos OS Evolved: An l2cpd crash will occur when specific LLDP packets are received — Junos OSCWE-1284 6.5 Medium2023-10-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.