Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0235 Junos OS: SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series: In a multi-tenant environment, a tenant host administrator may configure logical firewall isolation affecting other tenant networks — Junos OSCWE-276 7.3 High2021-04-22
CVE-2021-0236 Junos OS: A specific BGP VPNv6 flowspec message causes routing protocol daemon (rpd) process to crash with a core. — Junos OSCWE-754 6.5 Medium2021-04-22
CVE-2021-0234 Junos OS: QFX5100-96S: DDoS protection does not work as expected. — Junos OS 5.8 Medium2021-04-22
CVE-2021-0232 Paragon Active Assurance: Authentication bypass vulnerability in Control Center — Paragon Active AssuranceCWE-284 7.4 High2021-04-22
CVE-2021-0233 Junos OS: ACX500 Series, ACX4000 Series: Denial of Service due to FFEB crash while processing high rate of specific packets. — Junos OSCWE-794 7.5 High2021-04-22
CVE-2021-0231 Junos OS: SRX, vSRX Series: J-Web Path traversal vulnerability in SRX and vSRX Series leads to information disclosure. — Junos OSCWE-22 6.5 Medium2021-04-22
CVE-2021-0229 Junos OS: Receipt of specific packets could lead to Denial of Service in MQTT Server — Junos OSCWE-400 5.3 Medium2021-04-22
CVE-2021-0230 Junos OS: SRX Series: Memory leak when querying Aggregated Ethernet (AE) interface statistics — Junos OSCWE-400 7.5 High2021-04-22
CVE-2021-0228 Junos OS: MX Series: DDoS LACP violation upon receipt of specific layer 2 frames in EVPN-VXLAN deployment — Junos OSCWE-754 6.5 Medium2021-04-22
CVE-2021-0226 Junos OS Evolved: The IPv6 BGP session will flap due to receipt of a specific IPv6 packet — Junos OS Evolved 7.1 High2021-04-22
CVE-2021-0227 Junos OS: SRX Series: Denial of Service in J-Web upon receipt of crafted HTTP packets — Junos OSCWE-119 7.5 High2021-04-22
CVE-2021-0225 Junos OS Evolved: Stateless IP firewall filter does not work as expected — Junos OS EvolvedCWE-754 5.8 Medium2021-04-22
CVE-2021-0224 Junos OS: ANCPD core when hitting maximum-discovery-table-entries limit — Junos OSCWE-770 6.5 Medium2021-04-22
CVE-2021-0214 Junos OS: Denial of Service in ppmd upon receipt of malformed packet — Junos OSCWE-20 6.5 Medium2021-04-22
CVE-2021-0216 Junos OS: ACX5448, ACX710: BFD sessions might flap due to high rate of transit ARP packets — Junos OS 6.5 Medium2021-04-22
CVE-2021-0222 Junos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagating Denial of Service may occur. — Junos OS 7.4 High2021-01-15
CVE-2021-0223 Junos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries — Junos OSCWE-250 7.8 High2021-01-15
CVE-2021-0221 Junos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP multicast traffic — Junos OSCWE-703 6.5 Medium2021-01-15
CVE-2021-0219 Junos OS: Command injection vulnerability in 'request system software' CLI command — Junos OSCWE-78 6.7 Medium2021-01-15
CVE-2021-0220 Junos Space: Shared secrets stored in recoverable format and directly exposed through the UI — Junos SpaceCWE-257 6.8 Medium2021-01-15
CVE-2021-0218 Junos OS: Command injection vulnerability in license-check daemon — Junos OSCWE-78 7.8 High2021-01-15
CVE-2021-0215 Junos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwarding engine due to 802.1X authenticator port interface flaps — Junos OSCWE-400 6.5 Medium2021-01-15
CVE-2021-0217 Junos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets — Junos OSCWE-119 7.4 High2021-01-15
CVE-2021-0211 Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network traffic may be disrupted. — Junos OS 10.0 Critical2021-01-15
CVE-2021-0212 Contrail Networking: Administrator credentials are exposed in a plaintext file — Contrail NetworkingCWE-200 5.0 Medium2021-01-15
CVE-2021-0210 Junos OS: Privilege escalation in J-Web due to arbitrary command and code execution via information disclosure from another users active session — Junos OS 6.8 Medium2021-01-15
CVE-2021-0209 Junos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD to core when using REGEX. — Junos OS EvolvedCWE-824 6.5 Medium2021-01-15
CVE-2021-0207 NFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series: Certain genuine traffic received by the Junos OS device will be discarded instead of forwarded. — Junos OSCWE-436 7.5 High2021-01-15
CVE-2021-0208 Junos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router RPD may core upon receipt of specific malformed RSVP packet. — Junos OSCWE-20 8.8 High2021-01-15
CVE-2021-0205 Junos OS: MX Series: Dynamic filter fails to match IPv6 prefix — Junos OSCWE-284 5.8 Medium2021-01-15

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.