Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2025-52960 Junos OS: SRX Series and MX Series: Receipt of specific SIP packets in a high utilization situation causes a flowd/mspmand crash — Junos OSCWE-120 5.9 Medium2025-10-09
CVE-2025-11198 Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server — Security Director Policy EnforcerCWE-306 7.4 High2025-10-09
CVE-2025-52988 Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout' — Junos OSCWE-78 6.7 Medium2025-07-11
CVE-2025-6549 Junos OS: SRX Series: J-Web can be exposed on additional interfaces — Junos OSCWE-863 6.5 Medium2025-07-11
CVE-2025-52989 Junos OS and Junos OS Evolved: Annotate configuration command can be used to change the configuration — Junos OSCWE-140 5.1 Medium2025-07-11
CVE-2025-52986 Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks — Junos OSCWE-401 5.5 Medium2025-07-11
CVE-2025-52985 Junos OS Evolved: When a control-plane firewall filter refers to a prefix-list with more than 10 entries it's not matching — Junos OS EvolvedCWE-480 5.3 Medium2025-07-11
CVE-2025-52984 Junos OS and Junos OS Evolved: When a static route points to a reject next-hop and a gNMI query for this route is processed, RPD crashes — Junos OSCWE-476 5.9 Medium2025-07-11
CVE-2025-52983 Junos OS: After removing ssh public key authentication root can still log in — Junos OSCWE-446 7.2 High2025-07-11
CVE-2025-52982 Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash — Junos OSCWE-404 5.9 Medium2025-07-11
CVE-2025-52981 Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash — Junos OSCWE-754 7.5 High2025-07-11
CVE-2025-52980 Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message — Junos OSCWE-198 7.5 High2025-07-11
CVE-2025-52964 Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipath configured — Junos OSCWE-617 6.5 Medium2025-07-11
CVE-2025-52963 Junos OS: A low-privileged user can disable an interface — Junos OSCWE-284 5.5 Medium2025-07-11
CVE-2025-52953 Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset — Junos OSCWE-440 6.5 Medium2025-07-11
CVE-2025-52952 Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash — Junos OSCWE-787 6.5 Medium2025-07-11
CVE-2025-52958 Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash — Junos OSCWE-617 5.3 Medium2025-07-11
CVE-2025-52955 Junos OS and Junos OS Evolved: When jflow/sflow is configured continuous logical interface flaps causes rpd crash and restart — Junos OSCWE-131 6.5 Medium2025-07-11
CVE-2025-52954 Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system — Junos OS EvolvedCWE-862 7.8 High2025-07-11
CVE-2025-52951 Junos OS: IPv6 firewall filter fails to match payload-protocol — Junos OSCWE-693 5.8 Medium2025-07-11
CVE-2025-52950 Juniper Security Director: Insufficient authorization for multiple endpoints in web interface — Juniper Security DirectorCWE-862 9.6 Critical2025-07-11
CVE-2025-52949 Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-130 6.5 Medium2025-07-11
CVE-2025-52948 Junos OS: Specific unknown traffic pattern causes FPC and system to crash when packet capturing is enabled — Junos OSCWE-755 5.9 Medium2025-07-11
CVE-2025-52947 Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface flap causes the FEB to crash — Junos OSCWE-755 6.5 Medium2025-07-11
CVE-2025-52946 Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash — Junos OSCWE-416 7.5 High2025-07-11
CVE-2025-30661 Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation — Junos OSCWE-732 7.3 High2025-07-11
CVE-2025-30660 Junos OS: MX Series: Decapsulation of specific GRE packets leads to PFE reset — Junos OSCWE-754 7.5 High2025-04-09
CVE-2025-30659 Junos OS: SRX Series: A device configured for vector routing crashes when receiving malformed traffic — Junos OSCWE-130 7.5 High2025-04-09
CVE-2025-30658 Junos OS: SRX Series: On devices with Anti-Virus enabled, malicious server responses will cause memory to leak ultimately causing forwarding to stop — Junos OSCWE-401 7.5 High2025-04-09
CVE-2025-30657 Junos OS: Processing of a specific BGP update causes the SRRD process to crash — Junos OSCWE-116 5.3 Medium2025-04-09

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.