Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2022-22237 Junos OS: Peers not configured for TCP-AO can establish a BGP or LDP session even if authentication is configured locally — Junos OSCWE-287 6.5 Medium2022-10-18
CVE-2022-22236 Junos OS: SRX Series and MX Series: When specific valid SIP packets are received the PFE will crash — Junos OSCWE-824 7.5 High2022-10-18
CVE-2022-22235 Junos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed — Junos OSCWE-754 5.9 Medium2022-10-18
CVE-2022-22234 Junos OS: EX2300 and EX3400 Series: One of more SFPs might become unavailable when the system is very busy — Junos OSCWE-1250 5.5 Medium2022-10-18
CVE-2022-22233 Junos OS and Junos OS Evolved: In an SR to LDP interworking scenario, with SRMS, when a specific low privileged command is issued on an ABR rpd will crash — Junos OSCWE-690 5.5 Medium2022-10-18
CVE-2022-22232 SRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific traffic is processed the PFE will crash — Junos OSCWE-476 7.5 High2022-10-18
CVE-2022-22231 SRX Series: If UTM Enhanced Content Filtering and AntiVirus are enabled, and specific traffic is processed the PFE will crash — Junos OSCWE-690 7.5 High2022-10-18
CVE-2022-22230 Junos OS and Junos OS Evolved: RPD crash upon receipt of specific OSPFv3 LSAs — Junos OSCWE-20 6.5 Medium2022-10-18
CVE-2022-22229 Paragon Active Assurance (Formerly Netrounds): Stored Cross-site Scripting (XSS) vulnerability in web administration — Paragon Active Assurance (Formerly Netrounds)CWE-79 8.4 High2022-10-18
CVE-2022-22228 Junos OS: IPv6 OAM SRv6 network-enabled devices are vulnerable to Denial of Service (DoS) due to RPD memory leak upon receipt of specific a IPv6 packet — Junos OSCWE-1287 7.5 High2022-10-18
CVE-2022-22227 Junos OS Evolved: ACX7000 Series: Specific IPv6 transit traffic gets exceptioned to the routing-engine which causes increased CPU utilization — Junos OS EvolvedCWE-754 5.3 Medium2022-10-18
CVE-2022-22226 Junos OS: EX4300-MP, EX4600, QFX5000 Series: In VxLAN scenarios specific packets processed cause a memory leak leading to a PFE crash — Junos OSCWE-789 6.5 Medium2022-10-18
CVE-2022-22225 Junos OS and Junos OS Evolved: In a BGP multipath scenario, when one of the contributing routes is flapping often and rapidly, rpd may crash — Junos OS 5.9 Medium2022-10-18
CVE-2022-22224 Junos OS and Junos OS Evolved: PPMD goes into infinite loop upon receipt of malformed OSPF TLV — Junos OSCWE-703 6.5 Medium2022-10-18
CVE-2022-22223 Junos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted packets multiple interfaces in LAG configurations may detach. — Junos OSCWE-1285 6.5 Medium2022-10-18
CVE-2022-22220 Junos OS and Junos OS Evolved: Due to a race condition the rpd process can crash upon receipt of a BGP update message containing flow spec route — Junos OSCWE-367 5.9 Medium2022-10-18
CVE-2022-22219 Junos OS and Junos OS Evolved: RPD core upon receipt of a specific EVPN route by a BGP route reflector in an EVPN environment — Junos OSCWE-241 5.9 Medium2022-10-18
CVE-2022-22218 Junos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment — Junos OS 7.5 High2022-10-18
CVE-2022-22211 Junos OS Evolved: PTX Series: Multiple FPCs become unreachable due to continuous polling of specific SNMP OID — Junos OS Evolved 7.5 High2022-10-18
CVE-2022-22208 Junos OS and Junos OS Evolved: An rpd crash can occur due to memory corruption caused by flapping BGP sessions — Junos OSCWE-416 5.9 Medium2022-10-18
CVE-2022-22201 SRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet — Junos OSCWE-1285 7.5 High2022-10-18
CVE-2022-22192 Junos OS Evolved: PTX Series: An attacker can cause a kernel panic by sending a malformed TCP packet to the device — Junos OS Evolved 7.5 High2022-10-18
CVE-2022-22221 Junos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality — Junos OS 7.8 High2022-07-20
CVE-2022-22217 Junos OS: QFX10K Series: Denial of Service (DoS) upon receipt of crafted MLD packets on multi-homing ESI in VXLAN — Junos OSCWE-754 6.1 Medium2022-07-20
CVE-2022-22216 Junos OS: PTX Series and QFX10000 Series: 'Etherleak' memory disclosure in Ethernet padding data — Junos OSCWE-200 4.3 Medium2022-07-20
CVE-2022-22215 Junos OS and Junos OS Evolved: /var/run/<pid>.env files are potentially not deleted during termination of a gRPC connection causing inode exhaustion — Junos OS 6.5 Medium2022-07-20
CVE-2022-22214 Junos OS and Junos OS Evolved: In an MPLS scenario upon receipt of a specific IPv6 packet an FPC will crash — Junos OSCWE-20 6.5 Medium2022-07-20
CVE-2022-22213 Junos OS and Junos OS Evolved: Denial of Service (DoS) vulnerability in RPD upon receipt of specific BGP update — Junos OSCWE-232 5.9 Medium2022-07-20
CVE-2022-22212 Junos OS Evolved: A high rate of specific hostbound traffic will cause unexpected hostbound traffic delays or drops — Junos OS EvolvedCWE-770 7.5 High2022-07-20
CVE-2022-22210 Junos OS: QFX5000 Series and MX Series: An l2alm crash leading to an FPC crash can be observed in VxLAN scenario — Junos OSCWE-476 6.5 Medium2022-07-20

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.