Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2019-0064 Junos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet — Junos OS 7.5 High2019-10-09
CVE-2019-0065 Junos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC — Junos OS 5.3 Medium2019-10-09
CVE-2019-0066 Junos OS: A malformed IPv4 packet received by Junos in an NG-mVPN scenario may cause the routing protocol daemon (rpd) process to core — Junos OSCWE-394 7.5 High2019-10-09
CVE-2019-0067 Junos OS: Kernel crash (vmcore) upon receipt of a specific link-local IPv6 packet on devices configured with Multi-Chassis Link Aggregation Group (MC-LAG) — Junos OS 6.5 Medium2019-10-09
CVE-2019-0068 Junos OS: SRX Series: Denial of Service vulnerability in flowd due to multicast packets — Junos OS 6.5 Medium2019-10-09
CVE-2019-0069 Junos OS: vSRX, SRX1500, SRX4K, ACX5K, EX4600, QFX5100, QFX5110, QFX5200, QFX10K and NFX Series: console management port device authentication credentials are logged in clear text — Junos OS 5.9 Medium2019-10-09
CVE-2019-0070 Junos OS: NFX Series: An Improper Input Validation weakness allows a malicious local attacker to elevate their permissions. — Junos OS 8.8 High2019-10-09
CVE-2019-0071 Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS — Junos OSCWE-347 7.8 High2019-10-09
CVE-2019-0072 SBR Carrier: A vulnerability in the identity and access management certificate generation procedure allows a local attacker to gain access to confidential information. — SBR CarrierCWE-256 5.6 Medium2019-10-09
CVE-2019-0073 Junos OS: PKI key pairs are exported with insecure file permissions — Junos OSCWE-732 6.6 Medium2019-10-09
CVE-2019-0074 Junos OS: NFX150 Series, QFX10K Series, EX9200 Series, MX Series, PTX Series: Path traversal vulnerability in NFX150 and NG-RE leads to information disclosure. — Junos OS 5.5 Medium2019-10-09
CVE-2019-0075 Junos OS: SRX Series: Denial of Service vulnerability in srxpfe related to PIM — Junos OS 7.5 High2019-10-09
CVE-2019-0047 Junos OS: Persistent XSS vulnerability in J-Web — Junos OSCWE-79 8.8 High2019-10-09
CVE-2019-0050 Junos OS: SRX1500: Denial of service due to crash of srxpfe process under heavy traffic conditions. — Junos OS 7.5 High2019-10-09
CVE-2019-0051 SRX5000 Series: Denial of Service vulnerability in SSL-Proxy feature. — Junos OSCWE-755 6.5 Medium2019-10-09
CVE-2019-0054 Junos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks during app-id signature updates. — Junos OSCWE-295 6.8 Medium2019-10-09
CVE-2019-0055 Junos OS: SRX Series: An attacker may cause flowd to crash by sending certain valid SIP traffic to a device with SIP ALG enabled. — Junos OSCWE-130 7.5 High2019-10-09
CVE-2019-0056 Junos OS: MX Series: An MPC10 Denial of Service (DoS) due to OSPF states transitioning to Down, causes traffic to stop forwarding through the device. — Junos OSCWE-410 7.5 High2019-10-09
CVE-2019-0057 NFX Series: An attacker may be able to take control of the JDM application and subsequently the entire system. — Junos OS 7.8 High2019-10-09
CVE-2019-0058 Junos OS: SRX Series: A weakness in the Veriexec subsystem may allow privilege escalation. — Junos OS 7.8 High2019-10-09
CVE-2019-0046 Junos OS: EX4300 Series: Denial of Service upon receipt of large number of specific valid packets on management interface. — Junos OSCWE-400 6.5 -2019-07-11
CVE-2019-0048 EX4300 Series: When a firewall filter is applied to a loopback interface, other firewall filters for multicast traffic may fail — Junos OSCWE-200--2019-07-11
CVE-2019-0049 Junos OS: RPD process crashes when BGP peer restarts — Junos OSCWE-404 7.5 -2019-07-11
CVE-2019-0052 SRX Series: srxpfe process crash while JSF/UTM module parses specific HTTP packets — Junos OSCWE-404 7.5 -2019-07-11
CVE-2019-0053 Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow — Junos OSCWE-121 7.8 -2019-07-11
CVE-2019-0041 Junos OS: EX4300-MP Series: IP transit traffic can reach the control plane via loopback interface. — Junos OSCWE-284 8.6 -2019-04-10
CVE-2019-0042 Incorrect messages from Juniper Identity Management Service (JIMS) can trigger Denial of Service or firewall bypass conditions for SRX series devices — Juniper Identity Management ServiceCWE-404 4.2 -2019-04-10
CVE-2019-0043 Junos OS: RPD process crashes upon receipt of a specific SNMP packet — Junos OSCWE-404 7.5 -2019-04-10
CVE-2019-0044 Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0 interface — Junos OSCWE-404 7.5 -2019-04-10
CVE-2019-0008 QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding Engine manager (FXPC) process — Junos OSCWE-121 9.8 -2019-04-10

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.