Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2023-22405 Junos OS: QFX5k Series, EX46xx Series: MAC limiting feature stops working after PFE restart or device reboot — Junos OSCWE-1250 6.5 Medium2023-01-12
CVE-2023-22404 Junos OS: SRX Series and MX Series with SPC3: When IPsec VPN is configured iked will core when a specifically formatted payload is received — Junos OSCWE-787 6.5 Medium2023-01-12
CVE-2023-22403 Junos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic — Junos OSCWE-770 7.5 High2023-01-12
CVE-2023-22402 Junos OS Evolved: The kernel might restart in a BGP scenario where "bgp auto-discovery" is enabled and such a neighbor flaps — Junos OS EvolvedCWE-416 5.9 Medium2023-01-12
CVE-2023-22401 Junos OS and Junos OS Evolved: PTX10008, PTX10016: When a specific SNMP MIB is queried the FPC will crash — Junos OSCWE-129 7.5 High2023-01-12
CVE-2023-22400 Junos OS Evolved: A specific SNMP GET operation and a specific CLI commands cause resources to leak and eventually the evo-pfemand process will crash — Junos OS EvolvedCWE-400 7.5 High2023-01-12
CVE-2023-22399 Junos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled — Junos OSCWE-120 7.5 High2023-01-12
CVE-2023-22398 Junos OS and Junos OS Evolved: RPD might crash when MPLS ping is performed on BGP LSPs — Junos OSCWE-824 5.3 Medium2023-01-12
CVE-2023-22397 Junos OS Evolved: PTX10003: An attacker sending specific genuine packets will cause a memory leak in the PFE leading to a Denial of Service — Junos OS EvolvedCWE-770 6.1 Medium2023-01-12
CVE-2023-22396 Junos OS: Receipt of crafted TCP packets destined to the device results in MBUF leak leading to a Denial of Service (DoS) — Junos OSCWE-400 7.5 High2023-01-12
CVE-2023-22395 Junos OS: In an MPLS scenario the processing of specific packets to the device causes a buffer leak and ultimately a loss of connectivity — Junos OSCWE-401 6.5 Medium2023-01-12
CVE-2023-22394 Junos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls — Junos OSCWE-911 7.5 High2023-01-12
CVE-2023-22393 Junos OS and Junos OS Evolved: RPD crash upon receipt of BGP route with invalid next-hop — Junos OSCWE-358 7.5 High2023-01-12
CVE-2023-22391 Junos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS) — Junos OSCWE-755 7.5 High2023-01-12
CVE-2023-22416 Junos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash if SIP ALG is enabled and a malformed SIP packet is received — Junos OSCWE-120 7.5 High2023-01-12
CVE-2022-22184 Junos OS and Junos OS Evolved: A BGP session will flap upon receipt of a specific, optional transitive attribute in version 22.3R1 — Junos OSCWE-20 7.5 High2022-12-23
CVE-2022-22251 cSRX Series: Storing Passwords in a Recoverable Format and software permissions issues allows a local attacker to elevate privileges — Junos OSCWE-257 7.8 High2022-10-18
CVE-2022-22250 Junos OS and Junos OS Evolved: An FPC crash might be seen due to an EVPN MAC entry moving from local to remote — Junos OS 6.5 Medium2022-10-18
CVE-2022-22249 Junos OS: MX Series: An FPC crash might be seen due to mac-moves within the same bridge domain — Junos OS 6.5 Medium2022-10-18
CVE-2022-22248 Junos OS Evolved: Incorrect file permissions can allow low-privileged user to cause another user to execute arbitrary commands — Junos OS EvolvedCWE-732 7.3 High2022-10-18
CVE-2022-22247 Junos OS Evolved: Kernel processing of unvalidated TCP segments could lead to a Denial of Service (DoS) — Junos OS EvolvedCWE-20 7.5 High2022-10-18
CVE-2022-22246 Junos OS: PHP file inclusion vulnerability in J-Web — Junos OSCWE-829 7.5 High2022-10-18
CVE-2022-22245 Junos OS: Path traversal vulnerability in J-Web — Junos OSCWE-23 4.3 Medium2022-10-18
CVE-2022-22244 Junos OS: Unauthenticated XPath Injection vulnerability in J-Web — Junos OSCWE-91 5.3 Medium2022-10-18
CVE-2022-22243 Junos OS: XPath Injection vulnerability in J-Web — Junos OSCWE-20 4.3 Medium2022-10-18
CVE-2022-22242 Junos OS: Cross-site Scripting (XSS) vulnerability in J-Web — Junos OSCWE-79 6.1 Medium2022-10-18
CVE-2022-22241 Junos OS: Vulnerability in J-Web may allow deserialization without authentication — Junos OSCWE-20 8.1 High2022-10-18
CVE-2022-22240 Junos OS and Junos OS Evolved: An rpd memory leak might be observed while running a specific cli command in a RIB sharding scenario — Junos OS 5.5 Medium2022-10-18
CVE-2022-22239 Junos OS Evolved: The ssh CLI command always runs as root which can lead to privilege escalation — Junos OS EvolvedCWE-250 8.2 High2022-10-18
CVE-2022-22238 Junos OS and Junos OS Evolved: The rpd process will crash when a malformed incoming RESV message is processed — Junos OSCWE-754 5.3 Medium2022-10-18

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.