Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2020-1657 Junos OS: SRX Series: An attacker sending spoofed packets to IPSec peers may cause a Denial of Service. — Junos OSCWE-408 7.5 High2020-10-16
CVE-2020-1660 Junos OS: MX Series: Receipt of specific packets can cause services card to restart when DNS filtering is configured. — Junos OS 8.3 High2020-10-16
CVE-2020-1661 Junos OS: jdhcpd process crash when forwarding a malformed DHCP packet. — Junos OS 5.3 Medium2020-10-16
CVE-2020-1656 Junos OS: When a DHCPv6 Relay-Agent is configured upon receipt of a specific DHCPv6 client message, Remote Code Execution may occur. — Junos OS 8.8 High2020-10-16
CVE-2020-1655 Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmentation — Junos OS 5.3 Medium2020-07-17
CVE-2020-1653 Junos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak — Junos OSCWE-159 7.5 High2020-07-17
CVE-2020-1654 Junos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is enabled may can lead to flowd process crash or remote code execution — Junos OSCWE-120 9.8 Critical2020-07-17
CVE-2020-1651 Junos OS: MX Series: PFE on the line card may crash due to memory leak. — Junos OSCWE-19 6.5 Medium2020-07-17
CVE-2020-1652 Junos Space: OpenNMS is accessible via port 9443 — Junos SpaceCWE-213 5.6 Medium2020-07-17
CVE-2020-1649 Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reassembly — Junos OS 7.5 High2020-07-17
CVE-2020-1650 Junos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC — Junos OS 7.5 High2020-07-17
CVE-2020-1647 Junos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution due to the processing of a specific HTTP message when ICAP redirect service is enabled — Junos OSCWE-415 9.8 Critical2020-07-17
CVE-2020-1648 Junos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet — Junos OSCWE-159 7.5 High2020-07-17
CVE-2020-1645 Junos OS: MX Series: Services card might restart when DNS filtering is enabled — Junos OSCWE-362 8.3 High2020-07-17
CVE-2020-1646 Junos OS and Junos OS Evolved: RPD crash while processing a specific BGP update information. — Junos OS 7.5 High2020-07-17
CVE-2020-1641 Junos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and an LLDP crash. — Junos OSCWE-362 6.5 Medium2020-07-17
CVE-2020-1643 Junos OS: EX Series: RPD crash when executing specific "show ospf interface" commands from the CLI with OSPF authentication configured — Junos OSCWE-755 5.5 Medium2020-07-17
CVE-2020-1644 Junos OS and Junos OS Evolved: RPD crash due to specific BGP UPDATE packets — Junos OSCWE-703 7.5 High2020-07-17
CVE-2020-1640 Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash. — Junos OSCWE-1173 7.5 High2020-07-17
CVE-2020-1631 Out of Cycle Security Advisory: Junos OS: Security vulnerability in J-Web and web based (HTTP/HTTPS) services — Junos OSCWE-22 8.8 High2020-05-04
CVE-2020-1632 Junos OS and Junos OS Evolved: Invalid BGP UPDATE sent to peer device may cause BGP session to terminate. — Junos OS 8.6 High2020-04-15
CVE-2020-1633 Junos OS: MX Series: Crafted packets traversing a Broadband Network Gateway (BNG) configured with IPv6 NDP proxy could lead to Denial of Service — Junos OSCWE-20 7.4 High2020-04-09
CVE-2020-1638 Junos OS & Junos OS Evolved: A specific IPv4 packet can lead to FPC restart. — Junos OSCWE-467 7.5 High2020-04-08
CVE-2020-1639 Junos OS: A crafted Ethernet OAM packet received by Junos may cause the Ethernet OAM connectivity fault management process (CFM) to core. — Junos OSCWE-703 7.5 High2020-04-08
CVE-2020-1634 Junos OS: High-End SRX Series: Multicast traffic might cause all FPCs to reset. — Junos OS 7.5 High2020-04-08
CVE-2020-1637 Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability — Junos OSCWE-288 7.2 High2020-04-08
CVE-2020-1629 Junos OS: A race condition vulnerability may cause RPD daemon to crash when processing a BGP NOTIFICATION message. — Junos OSCWE-366 5.9 Medium2020-04-08
CVE-2020-1630 Junos OS: Privilege escalation vulnerability in dual REs, VC or HA cluster may allow unauthorized configuration change. — Junos OSCWE-264 5.0 Medium2020-04-08
CVE-2020-1627 Junos OS: vMX and MX150: Denial of Service vulnerability in packet processing — Junos OS 7.5 High2020-04-08
CVE-2020-1628 Junos OS: EX4300: Traffic from the network internal to the device (128.0.0.0) may be forwarded to egress interfaces — Junos OSCWE-200 5.3 Medium2020-04-08

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.