Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2018-0026 Junos OS: Stateless IP firewall filter rules stop working as expected after reboot or upgrade — Junos OS 7.5 -2018-07-11
CVE-2018-0027 Junos OS: Receipt of malformed RSVP packet may lead to RPD denial of service — Junos OS 7.5 -2018-07-11
CVE-2018-0029 Junos OS: Kernel crash (vmcore) during broadcast storm after enabling 'monitor traffic interface fxp0' — Junos OS 6.5 -2018-07-11
CVE-2018-0030 Junos OS: MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) and PTX1K: Line card may crash upon receipt of specific MPLS packet. — Junos OS 7.5 -2018-07-11
CVE-2018-0031 Junos OS: Receipt of specially crafted UDP packets over MPLS may bypass stateless IP firewall rules — Junos OS 5.9 -2018-07-11
CVE-2018-0032 Junos OS: RPD crash when receiving a crafted BGP UPDATE — Junos OS 7.5 -2018-07-11
CVE-2018-0034 Junos OS: A malicious crafted IPv6 DHCP packet may cause the JDHCPD daemon to core — Junos OS 5.9 -2018-07-11
CVE-2018-0035 Junos OS: QFX5200 and QFX10002: Unintended ONIE partition was shipped with certain Junos OS .bin and .iso images — Junos OS 9.1 -2018-07-11
CVE-2018-0037 Junos OS: RPD daemon crashes due to receipt of crafted BGP NOTIFICATION messages — Junos OS 9.8 -2018-07-11
CVE-2018-0039 Contrail Service Orchestration: Hardcoded credentials for Grafana service — Contrail Service OrchestrationCWE-798 9.8 -2018-07-11
CVE-2018-0040 Contrail Service Orchestration: hardcoded cryptographic certificates and keys — Contrail Service OrchestrationCWE-321 9.8 -2018-07-11
CVE-2018-0041 Contrail Service Orchestration: Hardcoded credentials for Keystone service. — Contrail Service OrchestrationCWE-798 9.1 -2018-07-11
CVE-2018-0016 Junos OS: Kernel crash upon receipt of crafted CLNP datagrams — Junos OS 7.5 -2018-04-11
CVE-2018-0017 SRX Series: Denial of service vulnerability in flowd daemon on devices configured with NAT-PT — Junos OS 7.5 -2018-04-11
CVE-2018-0018 SRX Series: A crafted packet may lead to information disclosure and firewall rule bypass during compilation of IDP policies. — Junos OS 6.8 -2018-04-11
CVE-2018-0019 Junos: Denial of service vulnerability in SNMP MIB-II subagent daemon (mib2d). — Junos OS 7.5 -2018-04-11
CVE-2018-0020 Junos OS: rpd daemon cores due to malformed BGP UPDATE packet — Junos OS 7.5 -2018-04-11
CVE-2018-0021 Junos OS: Short MacSec keys may allow man-in-the-middle attacks. — Junos OS 6.5 -2018-04-11
CVE-2018-0022 Junos OS: Mbuf leak due to processing MPLS packets in VPLS network. — Junos OS 9.1 -2018-04-11
CVE-2018-0023 Junos Snapshot Administrator (JSNAPy) world writeable default configuration file permission — Junos Snapshot Administrator (JSNAPy) 5.5 -2018-04-11
CVE-2018-0015 AppFormix: Debug Shell Command Execution in AppFormix Agent — AppFormix 8.8 -2018-02-22
CVE-2018-0001 Junos: Unauthenticated Remote Code Execution through J-Web interface — Junos OS 9.8 -2018-01-10
CVE-2018-0002 MX series, SRX series: Junos OS: Denial of service vulnerability in Flowd on devices with ALG enabled. — Junos OS 7.5 -2018-01-10
CVE-2018-0003 Junos OS: A crafted MPLS packet may lead to a kernel crash — Junos OS 6.5 -2018-01-10
CVE-2018-0004 Junos OS: Kernel Denial of Service Vulnerability — Junos OS 6.5 -2018-01-10
CVE-2018-0005 Security Bulletin: Junos OS: MAC move limit configured to drop traffic may forward traffic. — Junos OS 8.1 -2018-01-10
CVE-2018-0006 Junos OS: bbe-smgd process denial of service while processing VLAN authentication requests/rejects — Junos OS 5.3 -2018-01-10
CVE-2018-0008 Junos OS: commit script may allow unauthenticated root login upon reboot — Junos OS 6.8 -2018-01-10
CVE-2018-0009 SRX Series: Firewall bypass vulnerability when UUID with leading zeros is configured. — Junos OS 7.5 -2018-01-10
CVE-2018-0011 Junos Space: Reflected XSS vulnerability in Junos Space management interface — Junos Space 5.4 -2018-01-10

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.