Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2018-0012 Junos Space: Local privilege escalation vulnerability in Junos Space — Junos Space 7.8 -2018-01-10
CVE-2018-0013 Junos Space: Local File Inclusion Vulnerability — Junos Space 6.5 -2018-01-10
CVE-2018-0014 ScreenOS: Etherleak vulnerability found on ScreenOS device — ScreenOS 6.5 -2018-01-10
CVE-2016-1261 Junos: vulnerabilities in J-Web (CVE-2016-1261) — Junos OS 8.8 -2017-10-13
CVE-2016-1265 Junos Space: privilege escalation vulnerabilities in Junos Space — Junos OS 9.8 -2017-10-13
CVE-2016-4921 Junos: IPv6 denial of service vulnerability due to resource exhaustion (CVE-2016-4921) — Junos OS 7.5 -2017-10-13
CVE-2016-4922 Junos: Privilege escalation vulnerabilities in Junos CLI — Junos OS 7.8 -2017-10-13
CVE-2016-4923 Junos J-Web: Cross Site Scripting Vulnerability — Junos OS 6.1 -2017-10-13
CVE-2016-4924 vMX: Information leak vulnerability — Junos OS 5.5 -2017-10-13
CVE-2016-4925 JUNOSe: Line Card Reset: processor exception 0x68616c74 (halt) task: scheduler, upon receipt of crafted IPv6 packet — JunosE 8.6 -2017-10-13
CVE-2017-10606 SRX Series: Cryptographic weakness in SRX300 Series TPM Firmware — Junos OS 4.4 -2017-10-13
CVE-2017-10607 Junos: rpd core due to receipt of specially crafted BGP packet — Junos OS 7.5 -2017-10-13
CVE-2017-10608 SRX series: Junos OS: SRX series using IPv6 Sun/MS-RPC ALGs may experience flowd crash on processing packets. — Junos OS 7.5 -2017-10-13
CVE-2017-10610 SRX Series: Embedded ICMP may cause the flowd process to crash — Junos OS 5.9 -2017-10-13
CVE-2017-10611 Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with 'extended-statistics' enabled — Junos OS 5.9 -2017-10-13
CVE-2017-10612 Junos Space: Persistent Cross site scripting in Junos Space — Junos Space 8.2 -2017-10-13
CVE-2017-10613 Junos OS: A kernel hang may occur due to a specific loopback filter action command — Junos OS 5.5 -2017-10-13
CVE-2017-10614 Junos OS: A remote unauthenticated attacker can consume large amounts of CPU and/or memory through telnetd — Junos OS 7.5 -2017-10-13
CVE-2017-10615 Junos: Potential remote code execution vulnerability in PAM — Junos OS 9.8 -2017-10-13
CVE-2017-10616 Contrail: hard coded credentials — Contrail 5.3 Medium2017-10-13
CVE-2017-10617 Contrail: XML External Entity (XXE) vulnerability — Contrail 5.0 Medium2017-10-13
CVE-2017-10618 Junos: RPD core due to BGP UPDATE with malformed optional transitive attributes — Junos OS 5.9 -2017-10-13
CVE-2017-10619 Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets — Junos OS 7.5 -2017-10-13
CVE-2017-10620 SRX Series: Antivirus updates are downloaded without verification — Junos OS 7.4 -2017-10-13
CVE-2017-10621 Junos OS: Denial of service vulnerability in telnetd — Junos OS 7.5 -2017-10-13
CVE-2017-10622 Junos Space: Authentication bypass vulnerability — Junos Space 9.8 -2017-10-13
CVE-2017-10623 Junos Space: Insufficient verification of cluster messages — Junos Space 7.4 -2017-10-13
CVE-2017-10624 Junos Space: Insufficient verification of node certificates. — Junos Space 8.1 -2017-10-13
CVE-2017-10601 Junos OS: Insufficient authentication for user login when a specific system configuration error occurs. — Junos OS 9.8 -2017-07-14
CVE-2017-10602 Junos OS: buffer overflow vulnerability in Junos CLI — Junos OS 7.8 -2017-07-14

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.