Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0267 Junos OS: Receipt of a crafted DHCP packet will cause the jdhcpd DHCP service to core. — Junos OSCWE-20 7.4 High2021-04-22
CVE-2021-0265 Contrail Insights: The REST API implementation allows an unauthenticated remote attacker to execute commands as root. — Contrail Insights 8.1 High2021-04-22
CVE-2021-0263 Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow sampling is enabled — Junos OSCWE-19 5.9 Medium2021-04-22
CVE-2021-0264 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured — Junos OSCWE-703 5.9 Medium2021-04-22
CVE-2021-0262 Junos OS: QFX10002-60C: Use after free vulnerability found during static code analysis — Junos OSCWE-416 6.5 Medium2021-04-22
CVE-2021-0260 Junos OS: SNMP fails to properly perform authorization checks on incoming received SNMP requests. — Junos OSCWE-285 7.3 High2021-04-22
CVE-2021-0261 Junos OS: Denial of Service vulnerability in J-Web and web based (HTTP/HTTPS) services caused by a high number of specific requests — Junos OSCWE-125 7.5 High2021-04-22
CVE-2021-0259 Junos OS and Junos OS Evolved: QFX5K Series: Underlay network traffic might not be processed upon receipt of high rate of specific genuine overlay packets in VXLAN scenario — Junos OSCWE-755 7.4 High2021-04-22
CVE-2021-0258 Junos OS: Kernel panic upon receipt of specific TCPv6 packet on management interface — Junos OSCWE-362 5.9 Medium2021-04-22
CVE-2021-0256 Junos OS: mosquitto Local Privilege Escalation vulnerability in SUID binaries — Junos OSCWE-250 5.5 Medium2021-04-22
CVE-2021-0257 Junos OS: MX Series, EX9200 Series: Trio-based MPCs memory leak in VPLS with integrated routing and bridging (IRB) interface — Junos OSCWE-400 6.5 Medium2021-04-22
CVE-2021-0255 Junos OS: ethtraceroute Local Privilege Escalation vulnerability in SUID binaries — Junos OSCWE-250 5.5 Medium2021-04-22
CVE-2021-0253 Junos OS: NFX Series: Local Command Execution Vulnerability in JDMD Leads to Privilege Escalation — Junos OSCWE-77 7.8 High2021-04-22
CVE-2021-0254 Junos OS: Remote code execution vulnerability in overlayd service — Junos OSCWE-131 9.8 Critical2021-04-22
CVE-2021-0252 Junos OS: NFX Series: Local Code Execution Vulnerability in JDMD Leads to Privilege Escalation — Junos OSCWE-77 7.8 High2021-04-22
CVE-2021-0250 Junos OS and Junos OS Evolved: An attacker sending a specific crafted BGP update message will crash RPD — Junos OS 7.5 High2021-04-22
CVE-2021-0251 Junos OS: MX Series with MS-PIC, MS-SPC3, MS-MIC or MS-MPC: The BRAS Subscriber Services service activation portal is vulnerable to a Denial of Service (DoS) via malformed HTTP packets — Junos OS 8.6 High2021-04-22
CVE-2021-0249 Junos OS: SRX Series: A remote attacker may be able to cause a PFE buffer overflow to arbitrarily remotely execute code or commands on the target device with UTM enabled. — Junos OS 8.1 High2021-04-22
CVE-2021-0247 Junos OS: PTX Series, QFX Series: Due to a race condition input loopback firewall filters applied to interfaces may not operate even when listed in the running configuration. — Junos OSCWE-362 5.1 Medium2021-04-22
CVE-2021-0248 NFX Series: Hard-coded credentials allow an attacker to take control of any instance through administrative interfaces. — Junos OSCWE-798 10.0 Critical2021-04-22
CVE-2021-0246 Junos OS: SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3: In a multi-tenant environment, a tenant host administrator may be able to jailbreak out of their network impacting other tenant networks or gather information from other networks. — Junos OS 7.3 High2021-04-22
CVE-2021-0244 Junos OS: A race condition in the storm control profile may allow an attacker to cause a Denial of Service condition — Junos OS 7.4 High2021-04-22
CVE-2021-0245 Junos OS: Junos Fusion: Hard-coded credentials on satellite devices allows a locally authenticated attacker to elevate their privileges. — Junos OSCWE-798 7.8 High2021-04-22
CVE-2021-0243 Junos OS: EX4300: Stateless firewall policer fails to discard traffic — Junos OSCWE-241 4.7 Medium2021-04-22
CVE-2021-0241 Junos OS: Receipt of specific DHCPv6 packet may cause jdhcpd to crash and restart — Junos OSCWE-703 7.4 High2021-04-22
CVE-2021-0242 Junos OS: EX4300: FPC crash upon receipt of specific frames on an interface without L2PT or dot1x configured — Junos OSCWE-119 6.5 Medium2021-04-22
CVE-2021-0240 Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash and restart. — Junos OSCWE-703 7.4 High2021-04-22
CVE-2021-0238 Junos OS: MX Series: Executing CLI command repetitively may cause the system to run out of disk space — Junos OSCWE-400 5.5 Medium2021-04-22
CVE-2021-0239 Junos OS Evolved: Denial of Service due to receipt of specific genuine layer 2 frames. — Junos OS EvolvedCWE-754 6.5 Medium2021-04-22
CVE-2021-0237 Junos OS: EX4300-MP/EX4600/EX4650/QFX5K Series: Packet Forwarding Engine manager (FXPC) process crashes when deployed in a Virtual Chassis (VC) configuration — Junos OS 6.5 Medium2021-04-22

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.