Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

Found 658 results / 893Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2025-21598 Junos OS and Junos OS Evolved: When BGP traceoptions are configured, receipt of malformed BGP packets causes RPD to crash — Junos OSCWE-125 7.5 High2025-01-09
CVE-2025-21600 Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-125 6.5 Medium2025-01-09
CVE-2025-21602 Junos OS and Junos OS Evolved: Receipt of specially crafted BGP update packet causes RPD crash — Junos OSCWE-755 6.5 Medium2025-01-09
CVE-2025-21596 Junos OS: SRX1500,SRX4100,SRX4200: Execution of low-privileged CLI command results in chassisd crash — Junos OSCWE-755 5.5 Medium2025-01-09
CVE-2025-21593 Junos OS and Junos OS Evolved: On SRv6 enabled devices, an attacker sending a malformed BGP update can cause the rpd to crash — Junos OSCWE-664 6.5 Medium2025-01-09
CVE-2025-21592 Junos OS: SRX Series: Low privileged user able to access highly sensitive information on file system — Junos OSCWE-200 5.5 Medium2025-01-09
CVE-2024-47507 Junos OS and Junos OS Evolved: BGP update message containing aggregator attribute with an ASN value of zero (0) is accepted — Junos OSCWE-754 5.8 Medium2024-10-11
CVE-2024-47506 Junos OS: SRX Series: A large amount of traffic being processed by ATP Cloud can lead to a PFE crash — Junos OSCWE-833 5.9 Medium2024-10-11
CVE-2024-47504 Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash — Junos OSCWE-1287 7.5 High2024-10-11
CVE-2024-47503 Junos OS: SRX4600 and SRX5000 Series: Sequence of specific PIM packets causes a flowd crash — Junos OSCWE-754 6.5 Medium2024-10-11
CVE-2024-47501 Junos OS: MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C: In a VPLS or Junos Fusion scenario specific show commands cause FPCs to crash — Junos OSCWE-476 5.5 Medium2024-10-11
CVE-2024-47499 Junos OS and Junos OS Evolved: In a BMP scenario receipt of a malformed AS PATH attribute can cause an RPD crash — Junos OSCWE-754 7.5 High2024-10-11
CVE-2024-47497 Junos OS: SRX Series, QFX Series, MX Series and EX Series: Receiving specific HTTPS traffic causes resource exhaustion — Junos OSCWE-400 7.5 High2024-10-11
CVE-2024-47496 Junos OS: MX Series: The PFE will crash on running specific command — Junos OSCWE-476 5.5 Medium2024-10-11
CVE-2024-47494 Junos OS: Due to a race condition AgentD process causes a memory corruption and FPC reset — Junos OSCWE-367 5.9 Medium2024-10-11
CVE-2024-47493 Junos OS: MX Series: Trio-based FPCs: Continuous physical Interface flaps causes local FPC to crash — Junos OSCWE-401 6.5 Medium2024-10-11
CVE-2024-47491 Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash — Junos OSCWE-755 5.9 Medium2024-10-11
CVE-2024-39547 Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization — Junos OSCWE-755 7.5 High2024-10-11
CVE-2024-39527 Junos OS: SRX Series: Low privileged user able to access sensitive information on file system — Junos OSCWE-200 5.5 Medium2024-10-11
CVE-2024-39526 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11/LC9600, MX304, EX9200, PTX Series: Receipt of malformed DHCP packets causes interfaces to stop processing packets — Junos OSCWE-755 6.5 Medium2024-10-11
CVE-2024-39525 Junos OS and Junos OS Evolved: When BGP traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash — Junos OSCWE-755 7.5 High2024-10-09
CVE-2024-39516 Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-125 7.5 High2024-10-09
CVE-2024-39515 Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-1288 7.5 High2024-10-09
CVE-2024-39552 Junos OS and Junos OS Evolved: Malformed BGP UPDATE causes RPD crash — Junos OSCWE-755 7.5 High2024-07-11
CVE-2024-39551 Junos OS: SRX Series and MX Series with SPC3 and MS-MPC/MIC: Receipt of specific packets in H.323 ALG causes traffic drop — Junos OSCWE-400 7.5 High2024-07-11
CVE-2024-39550 Junos OS: MX Series with SPC3 line card: Port flaps causes rtlogd memory leak leading to Denial of Service — Junos OSCWE-401 6.5 Medium2024-07-11
CVE-2024-39549 Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak — Junos OSCWE-401 7.5 High2024-07-11
CVE-2024-39545 Junos OS: SRX Series, MX Series with SPC3 and NFX350: When VPN tunnels parameters are not configured in specific way the iked process will crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39543 Junos OS and Junos OS Evolved: Receipt of a large RPKI-RTR PDU packet can cause rpd to crash — Junos OSCWE-120 6.5 Medium2024-07-11
CVE-2024-39542 Junos OS and Junos OS Evolved: A malformed CFM packet or specific transit traffic leads to FPC crash — Junos OS 7.5 High2024-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.