Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2020-1624 Junos OS Evolved: objmon logs may leak sensitive information — Junos OS EvolvedCWE-532 5.5 Medium2020-04-08
CVE-2020-1625 Junos OS: Kernel memory leak in virtual-memory due to interface flaps — Junos OSCWE-400 6.5 Medium2020-04-08
CVE-2020-1626 Junos OS Evolved: Denial of Service vulnerability in processing high rate of specific packets — Junos OS Evolved 7.5 High2020-04-08
CVE-2020-1622 Junos OS Evolved: EvoSharedObjStore may leak sensitive information — Junos OS EvolvedCWE-664 5.5 Medium2020-04-08
CVE-2020-1623 Junos OS Evolved: ev.ops file may leak sensitive information — Junos OS EvolvedCWE-532 5.5 Medium2020-04-08
CVE-2020-1620 Junos OS Evolved: Configd leaks hashes via log file and is world readable — Junos OS EvolvedCWE-664 5.5 Medium2020-04-08
CVE-2020-1621 Junos OS Evolved: Configd leaks hashes via stream and is world readable — Junos OS EvolvedCWE-664 5.5 Medium2020-04-08
CVE-2020-1618 Junos OS: EX and QFX Series: Console port authentication bypass vulnerability — Junos OSCWE-288 6.3 Medium2020-04-08
CVE-2020-1619 Junos OS: QFX10K Series, EX9200 Series, MX Series, PTX Series: Privilege escalation vulnerability in NG-RE. — Junos OSCWE-264 6.0 Medium2020-04-08
CVE-2020-1616 JATP Series: JATP Is susceptible to slow brute force attacks on the SSH service. — JATP 5.3 Medium2020-04-08
CVE-2020-1617 Junos OS: PTX1000 and PTX10000 Series, QFX10000 Series using non-AFT architectures: A specific genuine packet inspected by sFlow will cause a reboot. — Junos OS 7.5 High2020-04-08
CVE-2020-1614 NFX250 Series: Hardcoded credentials in the vSRX VNF instance. — Juniper Networks NFX Series Network Services PlatformCWE-798 10.0 Critical2020-04-08
CVE-2020-1615 Junos OS: vMX: Default credentials supplied in vMX configuration — Junos OSCWE-798 9.8 Critical2020-04-08
CVE-2020-1613 Junos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement. — Junos OSCWE-710 8.6 High2020-04-08
CVE-2020-1608 Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service — Junos OS 7.5 High2020-01-15
CVE-2020-1609 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv6 packets and arbitrarily execute commands on the target device. — Junos OSCWE-121 8.8 High2020-01-15
CVE-2020-1611 Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device. — Junos Space 6.5 Medium2020-01-15
CVE-2020-1606 Junos OS: Path traversal vulnerability in J-Web — Junos OSCWE-22 5.4 Medium2020-01-15
CVE-2020-1607 Junos OS: Cross-Site Scripting (XSS) in J-Web — Junos OSCWE-79 7.5 High2020-01-15
CVE-2020-1604 Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets — Junos OSCWE-284 6.5 Medium2020-01-15
CVE-2020-1605 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets and arbitrarily execute commands on the target device. — Junos OSCWE-121 8.8 High2020-01-15
CVE-2020-1602 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets may take over the code execution of the JDHCPD process. — Junos OS 7.1 High2020-01-15
CVE-2020-1603 Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device. — Junos OSCWE-710 8.6 High2020-01-15
CVE-2020-1600 Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon. — Junos OSCWE-400 6.5 Medium2020-01-15
CVE-2020-1601 Junos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may crash. — Junos OS 5.3 Medium2020-01-15
CVE-2019-0059 Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host. — Junos OSCWE-400 7.5 High2019-10-09
CVE-2019-0060 Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets — Junos OS 7.5 High2019-10-09
CVE-2019-0061 Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation — Junos OSCWE-657 7.8 High2019-10-09
CVE-2019-0062 Junos OS: Session fixation vulnerability in J-Web — Junos OSCWE-384 7.5 High2019-10-09
CVE-2019-0063 Junos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message — Junos OS 6.5 Medium2019-10-09

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.