Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2023-28979 Junos OS: In a 6PE scenario upon receipt of a specific IPv6 packet an integrity check fails — Junos OSCWE-754 4.7 Medium2023-04-17
CVE-2023-28978 Junos OS Evolved: Read access to some confidential user information is possible — Junos OS EvolvedCWE-1188 5.3 Medium2023-04-17
CVE-2023-28976 Junos OS: MX Series: If a specific traffic rate goes above the DDoS threshold it will lead to an FPC crash — Junos OSCWE-754 7.5 High2023-04-17
CVE-2023-28975 Junos OS: The kernel will crash when certain USB devices are inserted — Junos OSCWE-394 4.6 Medium2023-04-17
CVE-2023-1697 Junos OS: QFX10000 Series, PTX1000 Series: The dcpfe process will crash when a malformed ethernet frame is received — Junos OSCWE-230 6.5 Medium2023-04-17
CVE-2023-28959 Junos OS: QFX10002: PFE wedges and restarts upon receipt of specific malformed packets — Junos OSCWE-703 6.5 Medium2023-04-17
CVE-2023-28960 Junos OS Evolved: Docker repository is world-writeable, allowing low-privileged local user to inject files into Docker containers — Junos OS EvolvedCWE-732 8.2 High2023-04-17
CVE-2023-28961 Junos OS: ACX Series: IPv6 firewall filter is not installed in PFE when "from next-header ah" is used — Junos OSCWE-241 5.8 Medium2023-04-17
CVE-2023-28962 Junos OS: Unauthenticated access vulnerability in J-Web — Junos OSCWE-287 5.3 Medium2023-04-17
CVE-2023-28963 Junos OS: User-controlled input vulnerability in J-Web — Junos OSCWE-287 5.3 Medium2023-04-17
CVE-2023-28964 Junos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash — Junos OSCWE-130 7.5 High2023-04-17
CVE-2023-28965 Junos OS: QFX10002: Failure of storm control feature may lead to Denial of Service — Junos OSCWE-703 6.5 Medium2023-04-17
CVE-2023-28966 Junos OS Evolved: Local low-privileged user with shell access can execute CLI commands as root — Junos OS EvolvedCWE-276 7.8 High2023-04-17
CVE-2023-28967 Junos OS and Junos OS Evolved: An attacker sending genuine BGP packets causes an RPD crash — Junos OS 7.5 High2023-04-17
CVE-2023-28968 Junos OS: SRX Series: Policies that rely on JDPI-Decoder actions may fail open — Junos OSCWE-1325 5.3 Medium2023-04-17
CVE-2023-28970 Junos OS: JRR200: Kernel crash upon receipt of a specific packet — Junos OSCWE-703 6.5 Medium2023-04-17
CVE-2023-28971 Paragon Active Assurance: Enabling the timescaledb enables IP forwarding — Paragon Active AssuranceCWE-923 7.2 High2023-04-17
CVE-2023-28972 Junos OS: NFX Series: 'set system ports console insecure' allows root password recovery — Junos OSCWE-59 6.8 Medium2023-04-17
CVE-2023-28973 Junos OS Evolved: The 'sysmanctl' shell command allows a local user to gain access to some administrative actions — Junos OS EvolvedCWE-285 7.1 High2023-04-17
CVE-2023-22397 Junos OS Evolved: PTX10003: An attacker sending specific genuine packets will cause a memory leak in the PFE leading to a Denial of Service — Junos OS EvolvedCWE-770 6.1 Medium2023-01-12
CVE-2023-22403 Junos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic — Junos OSCWE-770 7.5 High2023-01-12
CVE-2023-22402 Junos OS Evolved: The kernel might restart in a BGP scenario where "bgp auto-discovery" is enabled and such a neighbor flaps — Junos OS EvolvedCWE-416 5.9 Medium2023-01-12
CVE-2023-22401 Junos OS and Junos OS Evolved: PTX10008, PTX10016: When a specific SNMP MIB is queried the FPC will crash — Junos OSCWE-129 7.5 High2023-01-12
CVE-2023-22400 Junos OS Evolved: A specific SNMP GET operation and a specific CLI commands cause resources to leak and eventually the evo-pfemand process will crash — Junos OS EvolvedCWE-400 7.5 High2023-01-12
CVE-2023-22399 Junos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled — Junos OSCWE-120 7.5 High2023-01-12
CVE-2023-22398 Junos OS and Junos OS Evolved: RPD might crash when MPLS ping is performed on BGP LSPs — Junos OSCWE-824 5.3 Medium2023-01-12
CVE-2023-22394 Junos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls — Junos OSCWE-911 7.5 High2023-01-12
CVE-2023-22391 Junos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS) — Junos OSCWE-755 7.5 High2023-01-12
CVE-2023-22393 Junos OS and Junos OS Evolved: RPD crash upon receipt of BGP route with invalid next-hop — Junos OSCWE-358 7.5 High2023-01-12
CVE-2023-22404 Junos OS: SRX Series and MX Series with SPC3: When IPsec VPN is configured iked will core when a specifically formatted payload is received — Junos OSCWE-787 6.5 Medium2023-01-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.