Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

Found 91 results / 893Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-39523 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39522 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39521 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39520 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39519 Junos OS Evolved: ACX 7000 Series: Multicast traffic is looped in a multihoming EVPN MPLS scenario — Junos OS EvolvedCWE-754 6.5 Medium2024-07-11
CVE-2024-39513 Junos OS Evolved: Execution of a specific CLI command will cause a crash in the AFT manager — Junos OS EvolvedCWE-20 5.5 Medium2024-07-10
CVE-2024-39512 Junos OS Evolved: User is not logged out when the console cable is disconnected — Junos OS EvolvedCWE-1263 6.6 Medium2024-07-10
CVE-2024-39562 Junos OS Evolved: A high rate of SSH connections causes a Denial of Service — Junos OS EvolvedCWE-772 7.5 High2024-07-10
CVE-2024-39559 Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled — Junos OS EvolvedCWE-754 5.9 Medium2024-07-10
CVE-2024-39557 Junos OS Evolved: MAC table changes cause a memory leak — Junos OS EvolvedCWE-400 6.5 Medium2024-07-10
CVE-2024-30403 Junos OS Evolved: When MAC learning happens, and an interface gets flapped, the PFE crashes — Junos OS EvolvedCWE-476 6.5 Medium2024-04-12
CVE-2024-30390 Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced — Junos OS EvolvedCWE-307 5.3 Medium2024-04-12
CVE-2024-30406 Junos OS Evolved: ACX Series with Paragon Active Assurance Test Agent: A local high privileged attacker can recover other administrators credentials — Junos OS EvolvedCWE-313 5.5 Medium2024-04-12
CVE-2024-21590 Junos OS Evolved: Packets which are not destined to the device can reach the RE — Junos OS EvolvedCWE-20 5.3 Medium2024-04-12
CVE-2024-21612 Junos OS Evolved: Specific TCP traffic causes OFP core and restart of RE — Junos OS EvolvedCWE-228 7.5 High2024-01-12
CVE-2024-21604 Junos OS Evolved: A high rate of specific traffic will cause a complete system outage — Junos OS EvolvedCWE-770 7.5 High2024-01-12
CVE-2024-21602 Junos OS Evolved: ACX7024, ACX7100-32C and ACX7100-48L: Traffic stops when a specific IPv4 UDP packet is received by the RE — Junos OS EvolvedCWE-476 7.5 High2024-01-12
CVE-2023-44196 Junos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach the RE — Junos OS EvolvedCWE-754 6.5 Medium2023-10-12
CVE-2023-44195 Junos OS Evolved: Packets which are not destined to the router can reach the RE — Junos OS EvolvedCWE-923 5.4 Medium2023-10-12
CVE-2023-44190 Junos OS Evolved: PTX10001, PTX10004, PTX10008, PTX10016: MAC address validation bypass vulnerability — Junos OS EvolvedCWE-346 6.1 Medium2023-10-11
CVE-2023-44189 Junos OS Evolved: PTX10003 Series: MAC address validation bypass vulnerability — Junos OS EvolvedCWE-346 6.1 Medium2023-10-11
CVE-2023-44187 Junos OS Evolved: 'file copy' CLI command can disclose password to shell users — Junos OS EvolvedCWE-200 5.9 Medium2023-10-11
CVE-2023-36833 Junos OS Evolved: PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202: The aftman-bt process will crash in a MoFRR scenario after multiple link flaps — Junos OS EvolvedCWE-416 6.5 Medium2023-07-14
CVE-2023-28966 Junos OS Evolved: Local low-privileged user with shell access can execute CLI commands as root — Junos OS EvolvedCWE-276 7.8 High2023-04-17
CVE-2023-28973 Junos OS Evolved: The 'sysmanctl' shell command allows a local user to gain access to some administrative actions — Junos OS EvolvedCWE-285 7.1 High2023-04-17
CVE-2023-28960 Junos OS Evolved: Docker repository is world-writeable, allowing low-privileged local user to inject files into Docker containers — Junos OS EvolvedCWE-732 8.2 High2023-04-17
CVE-2023-28983 Junos OS Evolved: Shell Injection vulnerability in the gNOI server — Junos OS EvolvedCWE-78 8.8 High2023-04-17
CVE-2023-28978 Junos OS Evolved: Read access to some confidential user information is possible — Junos OS EvolvedCWE-1188 5.3 Medium2023-04-17
CVE-2023-22400 Junos OS Evolved: A specific SNMP GET operation and a specific CLI commands cause resources to leak and eventually the evo-pfemand process will crash — Junos OS EvolvedCWE-400 7.5 High2023-01-12
CVE-2023-22402 Junos OS Evolved: The kernel might restart in a BGP scenario where "bgp auto-discovery" is enabled and such a neighbor flaps — Junos OS EvolvedCWE-416 5.9 Medium2023-01-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.