Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

Found 658 results / 893Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-21905 Junos OS: SRX Series, MX Series with MX-SPC3 or MS-MPC: Receipt of multiple specific SIP messages results in flow management process crash — Junos OSCWE-835 7.5 High2026-01-15
CVE-2026-21903 Junos OS: Subscribing to telemetry sensors at scale causes all FPCs to crash — Junos OSCWE-121 6.5 Medium2026-01-15
CVE-2026-0203 Junos OS: Receipt of a specifically malformed ICMP packet causes an FPC restart — Junos OSCWE-755 6.5 Medium2026-01-15
CVE-2025-60011 Junos OS and Junos OS Evolved: Optional transitive BGP attribute is modified before propagation to peers causing sessions to flap — Junos OSCWE-754 5.8 Medium2026-01-15
CVE-2025-60007 Junos OS: A specifically crafted 'show chassis' command causes chassisd to crash — Junos OSCWE-476 5.5 Medium2026-01-15
CVE-2025-60003 Junos OS and Junos OS Evolved: BGP update with a set of specific attributes causes rpd crash — Junos OSCWE-126 7.5 High2026-01-15
CVE-2025-59961 Junos OS and Junos OS Evolved: Unix socket used to control the jdhcpd process is world-writable — Junos OSCWE-732 5.5 Medium2026-01-15
CVE-2025-59960 Junos OS and Junos OS Evolved: DHCP Option 82 messages from clients being passed unmodified to the DHCP server — Junos OSCWE-754 7.4 High2026-01-15
CVE-2025-59959 Junos OS and Junos OS Evolved: Executing a specific show command leads to an rpd crash — Junos OSCWE-822 5.5 Medium2026-01-15
CVE-2025-60010 Junos OS and Junos OS Evolved: Device allows login for user with expired password — Junos OSCWE-262 5.4 Medium2025-10-09
CVE-2025-60004 Junos OS and Junos OS Evolved: Specific BGP EVPN update message causes rpd crash — Junos OSCWE-754 7.5 High2025-10-09
CVE-2025-59980 Junos OS: When a user with the name ftp or anonymous is configured unauthenticated filesystem access is allowed — Junos OSCWE-305 6.5 Medium2025-10-09
CVE-2025-59964 Junos OS: SRX4700: When forwarding-options sampling is enabled any traffic destined to the RE will cause the forwarding line card to crash and restart — Junos OSCWE-908 7.5 High2025-10-09
CVE-2025-59962 Junos OS and Junos OS Evolved: With BGP sharding enabled, change in indirect next-hop can cause RPD crash — Junos OSCWE-824 5.3 Medium2025-10-09
CVE-2025-59957 Junos OS: EX4600 Series and QFX5000 Series: An attacker with physical access can open a persistent backdoor — Junos OSCWE-346 6.8 Medium2025-10-09
CVE-2025-52960 Junos OS: SRX Series and MX Series: Receipt of specific SIP packets in a high utilization situation causes a flowd/mspmand crash — Junos OSCWE-120 5.9 Medium2025-10-09
CVE-2025-52988 Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout' — Junos OSCWE-78 6.7 Medium2025-07-11
CVE-2025-6549 Junos OS: SRX Series: J-Web can be exposed on additional interfaces — Junos OSCWE-863 6.5 Medium2025-07-11
CVE-2025-52989 Junos OS and Junos OS Evolved: Annotate configuration command can be used to change the configuration — Junos OSCWE-140 5.1 Medium2025-07-11
CVE-2025-52986 Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks — Junos OSCWE-401 5.5 Medium2025-07-11
CVE-2025-52984 Junos OS and Junos OS Evolved: When a static route points to a reject next-hop and a gNMI query for this route is processed, RPD crashes — Junos OSCWE-476 5.9 Medium2025-07-11
CVE-2025-52983 Junos OS: After removing ssh public key authentication root can still log in — Junos OSCWE-446 7.2 High2025-07-11
CVE-2025-52982 Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash — Junos OSCWE-404 5.9 Medium2025-07-11
CVE-2025-52981 Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash — Junos OSCWE-754 7.5 High2025-07-11
CVE-2025-52980 Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message — Junos OSCWE-198 7.5 High2025-07-11
CVE-2025-52964 Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipath configured — Junos OSCWE-617 6.5 Medium2025-07-11
CVE-2025-52963 Junos OS: A low-privileged user can disable an interface — Junos OSCWE-284 5.5 Medium2025-07-11
CVE-2025-52953 Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset — Junos OSCWE-440 6.5 Medium2025-07-11
CVE-2025-52952 Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash — Junos OSCWE-787 6.5 Medium2025-07-11
CVE-2025-52958 Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash — Junos OSCWE-617 5.3 Medium2025-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.