Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0206 Junos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL Proxy is configured. — Junos OSCWE-476 7.5 High2021-01-15
CVE-2021-0204 Junos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries — Junos OSCWE-250 7.8 High2021-01-15
CVE-2021-0202 Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and Bridging (IRB) interface is mapped to a VPLS instance or a Bridge-Domain — Junos OSCWE-400 7.5 High2021-01-15
CVE-2021-0203 Junos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trunk Group is configured — Junos OSCWE-794 8.6 High2021-01-15
CVE-2020-1689 Junos OS: EX4300-MP/EX4600/QFX5K Series: High CPU load due to receipt of specific layer 2 frames when deployed in a Virtual Chassis configuration — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1687 Junos OS: EX4300-MP/EX4600/QFX5K Series: High CPU load due to receipt of specific layer 2 frames in EVPN-VXLAN deployment. — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1688 Junos OS: SRX and NFX Series: Insufficient Web API private key protection — Junos OSCWE-359 6.5 Medium2020-10-16
CVE-2020-1685 Junos OS: EX4600, QFX5K Series: Stateless firewall filter matching 'user-vlan-id' will cause incomplete discard action — Junos OSCWE-203 5.8 Medium2020-10-16
CVE-2020-1686 Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet. — Junos OSCWE-415 7.5 High2020-10-16
CVE-2020-1683 Junos OS: Memory leak leads to kernel crash (vmcore) due to SNMP polling — Junos OSCWE-401 7.5 High2020-10-16
CVE-2020-1684 Junos OS: SRX Series: High CPU load due to processing for HTTP traffic when Application Identification is enabled. — Junos OSCWE-400 7.5 High2020-10-16
CVE-2020-1680 Junos OS: MX Series: MS-MPC/MIC might crash when processing malformed IPv6 packet in NAT64 configuration. — Junos OSCWE-131 5.3 Medium2020-10-16
CVE-2020-1681 Junos OS Evolved: Receipt of a specifically malformed NDP packet could lead to Denial of Service — Junos OS EvolvedCWE-755 6.5 Medium2020-10-16
CVE-2020-1682 Junos OS: SRX1500, vSRX, SRX4K, NFX150, NFX250: Denial of service vulnerability executing local CLI command — Junos OSCWE-20 5.5 Medium2020-10-16
CVE-2020-1678 Junos OS and Junos OS Evolved: RPD can crash due to a slow memory leak. — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1679 Junos OS: PTX/QFX Series: Kernel Routing Table (KRT) queue stuck after packet sampling a malformed packet when the tunnel-observation mpls-over-udp configuration is enabled. — Junos OSCWE-20 7.5 High2020-10-16
CVE-2020-1676 Juniper Networks Mist Cloud UI: SAML authentication response handling vulnerability. — MIST Cloud UICWE-20 7.2 High2020-10-16
CVE-2020-1677 Juniper Networks Mist Cloud UI: SAML authentication attribute elements handling vulnerability. — MIST Cloud UICWE-20 7.2 High2020-10-16
CVE-2020-1675 Juniper Networks Mist Cloud UI: SAML authentication certificate vulnerability. — MIST Cloud UICWE-299 8.3 High2020-10-16
CVE-2020-1672 Junos OS: jdhcpd process crash when processing a specific DHCPDv6 packet in DHCPv6 relay configuration. — Junos OS 7.5 High2020-10-16
CVE-2020-1673 Junos OS: Reflected Cross-site Scripting vulnerability in J-Web and web based (HTTP/HTTPS) services — Junos OSCWE-79 8.8 High2020-10-16
CVE-2020-1669 Junos OS: NFX350: Password hashes stored in world-readable format — Junos OSCWE-256 6.3 Medium2020-10-16
CVE-2020-1670 Junos OS: EX4300 Series: High CPU load due to receipt of specific IPv4 packets — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1671 Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash. — Junos OSCWE-119 7.5 High2020-10-16
CVE-2020-1667 Junos OS: MX Series: Services card might restart due to a race condition when DNS filtering is enabled. — Junos OSCWE-362 8.3 High2020-10-16
CVE-2020-1668 Junos OS: EX2300 Series: High CPU load due to receipt of specific multicast packets on layer 2 interface — Junos OSCWE-400 6.5 Medium2020-10-16
CVE-2020-1665 Junos OS: MX series/EX9200 Series: IPv6 DDoS protection does not work as expected. — Junos OSCWE-794 5.3 Medium2020-10-16
CVE-2020-1666 Junos OS Evolved: 'console log-out-on-disconnect' fails to terminate session on console cable disconnection — Junos OS EvolvedCWE-284 6.6 Medium2020-10-16
CVE-2020-1662 Junos OS and Junos OS Evolved: RPD crash due to BGP session flapping. — Junos OSCWE-20 7.5 High2020-10-16
CVE-2020-1664 Junos OS: Buffer overflow vulnerability in device control daemon — Junos OSCWE-121 7.8 High2020-10-16

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.