Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2022-22209 Junos OS: RIB and PFEs can get out of sync due to a memory leak caused by interface flaps or route churn — Junos OSCWE-401 7.5 High2022-07-20
CVE-2022-22207 Junos OS: MX Series with MPC11: In a GNF / node slicing scenario gathering AF interface statistics can lead to a kernel crash — Junos OSCWE-416 7.5 High2022-07-20
CVE-2022-22206 Junos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search — Junos OS 7.5 High2022-07-20
CVE-2022-22205 Junos OS: SRX Series: An FPC memory leak can occur in an APBR scenario — Junos OSCWE-401 7.5 High2022-07-20
CVE-2022-22204 Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic — Junos OSCWE-401 5.3 Medium2022-07-20
CVE-2022-22203 Junos OS: EX4600 Series and QFX5000 Series: Receipt of specific traffic will lead to an fxpc process crash followed by an FPC reboot — Junos OSCWE-697 6.5 Medium2022-07-20
CVE-2022-22202 Junos OS: PTX Series: FPCs may restart unexpectedly upon receipt of specific MPLS packets with certain multi-unit interface configurations — Junos OSCWE-755 6.5 Medium2022-07-20
CVE-2022-22198 Junos OS: MX MS-MPC or MS-MIC, or SRX SPC crashes if it receives a SIP message with a specific contact header format — Junos OSCWE-824 7.5 High2022-04-14
CVE-2022-22197 Junos OS and Junos OS Evolved: An rpd core will be observed with proxy BGP route-target filtering enabled and certain route add and delete event happening — Junos OSCWE-672 7.5 High2022-04-14
CVE-2022-22196 Junos OS and Junos OS Evolved: The rpd CPU spikes to 100% after a malformed ISIS TLV has been received — Junos OSCWE-754 6.5 Medium2022-04-14
CVE-2022-22195 Junos OS Evolved: Specific packets reaching the RE lead to a counter overflow and eventually a crash — Junos OS EvolvedCWE-911 7.5 High2022-04-14
CVE-2022-22194 Junos OS Evolved: PTX series: An attacker sending a crafted GRE packet will cause the PFE to restart — Junos OS EvolvedCWE-754 7.5 High2022-04-14
CVE-2022-22193 Junos OS and Junos OS Evolved: In a BGP rib-sharding scenario when a certain CLI command is executed the rpd process might crash — Junos OSCWE-241 5.5 Medium2022-04-14
CVE-2022-22191 Junos OS: EX4300: PFE Denial of Service (DoS) upon receipt of a flood of specific ARP traffic — Junos OSCWE-410 6.5 Medium2022-04-14
CVE-2022-22190 Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL — Paragon Active AssuranceCWE-284 7.4 High2022-04-14
CVE-2022-22189 Contrail Service Orchestration: An authenticated local user may have their permissions elevated via the device via management interface without authentication — Contrail Service OrchestrationCWE-288 7.3 High2022-04-14
CVE-2022-22188 Junos OS: QFX5100/QFX5110/QFX5120/QFX5200/QFX5210/EX4600/EX4650 Series: When storm control profiling is enabled and a device is under an active storm, a Heap-based Buffer Overflow in the PFE will cause a device to hang. — Junos OSCWE-789 7.5 High2022-04-14
CVE-2022-22187 JIMS: Local Privilege Escalation vulnerability via repair functionality — Juniper Identity Management Service (JIMS)CWE-269 7.8 High2022-04-14
CVE-2022-22186 Junos OS: EX4650 Series: Certain traffic received by the Junos OS device on the management interface may be forwarded to egress interfaces instead of discarded — Junos OSCWE-665 7.2 High2022-04-14
CVE-2022-22185 Junos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet — Junos OSCWE-754 7.5 High2022-04-14
CVE-2022-22183 Junos OS Evolved: A remote attacker may cause a CPU Denial of Service by sending genuine traffic to a device on a specific IPv4 port. — Junos OS Evolved 7.5 High2022-04-14
CVE-2022-22182 Junos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session — Junos OSCWE-79 8.8 High2022-04-14
CVE-2022-22181 Junos OS: J-Web can be compromised through reflected XSS attacks — Junos OSCWE-79 8.0 High2022-04-14
CVE-2022-22180 Junos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets — Junos OSCWE-754 7.5 High2022-01-19
CVE-2022-22179 Junos OS: jdhcpd crashes upon receiving a specific DHCP packet — Junos OS 6.5 Medium2022-01-19
CVE-2022-22178 Junos OS: MX and SRX series: Flowd core observed if the SIP ALG is enabled and a specific Session Initiation Protocol (SIP) packet is received — Junos OSCWE-121 7.5 High2022-01-19
CVE-2022-22177 Junos OS and Junos OS Evolved: After receiving a specific number of crafted packets snmpd will segmentation fault (SIGSEGV) requiring a manual restart. — Junos OS 5.3 Medium2022-01-19
CVE-2022-22176 Junos OS: In a scenario with dhcp-security and option-82 configured jdhcpd crashes upon receipt of a malformed DHCP packet — Junos OSCWE-1286 7.4 High2022-01-19
CVE-2022-22175 Junos OS: MX Series and SRX Series: The flowd daemon will crash if the SIP ALG is enabled and specific SIP messages are processed — Junos OSCWE-667 7.5 High2022-01-19
CVE-2022-22174 Junos OS: QFX5000 Series, EX4600: Device may run out of memory, causing traffic loss, upon receipt of specific IPv6 packets — Junos OSCWE-755 7.5 High2022-01-19

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.