Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2025-30656 Junos OS: MX Series, SRX Series: Processing of specific SIP INVITE messages by the SIP ALG will lead to an FPC crash — Junos OSCWE-167 7.5 High2025-04-09
CVE-2025-30655 Junos OS and Junos OS Evolved: A specific CLI command will cause an RPD crash when rib-sharding and update-threading is enabled — Junos OSCWE-754 5.5 Medium2025-04-09
CVE-2025-30654 Junos OS and Junos OS Evolved: A local, low privileged user can access sensitive information — Junos OSCWE-200 5.5 Medium2025-04-09
CVE-2025-30653 Junos OS and Junos OS Evolved: LSP flap in a specific MPLS scenario leads to rpd crash — Junos OSCWE-825 6.5 Medium2025-04-09
CVE-2025-30652 Junos OS and Junos OS Evolved: Executing a specific CLI command when asregex-optimized is configured causes an rpd crash — Junos OSCWE-755 5.5 Medium2025-04-09
CVE-2025-30651 Junos OS and Junos OS Evolved: Receipt of a specific ICMPv6 packet causes a memory overrun leading to an rpd crash — Junos OSCWE-805 7.5 High2025-04-09
CVE-2025-30649 Junos OS: MX240, MX480, MX960 with SPC3: An attacker sending specific packets will cause a CPU utilization DoS. — Junos OSCWE-20 7.5 High2025-04-09
CVE-2025-30648 Junos OS and Junos OS Evolved: Receipt of a specifically malformed DHCP packet causes jdhcpd process to crash — Junos OSCWE-20 7.4 High2025-04-09
CVE-2025-30647 Junos OS: MX Series: Subscriber login/logout activity will lead to a memory leak — Junos OSCWE-401 6.5 Medium2025-04-09
CVE-2025-30646 Junos OS and Junos OS Evolved: Receipt of a malformed LLDP TLV results in l2cpd crash — Junos OSCWE-195 6.5 Medium2025-04-09
CVE-2025-30645 Junos OS: SRX Series: Transmission of specific control traffic sent out of a DS-Lite tunnel results in flowd crash — Junos OSCWE-476 7.5 High2025-04-09
CVE-2025-30644 Junos OS: EX2300, EX3400, EX4000 Series, QFX5k Series: Receipt of a specific DHCP packet causes FPC crash when DHCP Option 82 is enabled — Junos OSCWE-122 7.5 High2025-04-09
CVE-2025-21601 Junos OS: SRX and EX Series, MX240, MX480, MX960, QFX5120 Series: When web management is enabled for specific services an attacker may cause a CPU spike by sending genuine packets to the device — Junos OS 7.5 High2025-04-09
CVE-2025-21597 Junos OS and Junos OS Evolved: When BGP rib-sharding and update-threading are configured and a peer flaps, an rpd core is observed — Junos OSCWE-754 5.3 Medium2025-04-09
CVE-2025-21595 Junos OS and Junos OS Evolved: In an EVPN-VXLAN scenario specific ARP or NDP packets cause FPC to crash — Junos OSCWE-401 6.5 Medium2025-04-09
CVE-2025-21594 Junos OS: MX Series: In DS-lite and NAT scenario receipt of crafted IPv6 traffic causes port block — Junos OSCWE-754 7.5 High2025-04-09
CVE-2025-21591 Junos OS: An unauthenticated adjacent attacker sending a malformed DHCP packet causes jdhcpd to crash — Junos OSCWE-805 7.4 High2025-04-09
CVE-2025-21590 Junos OS: An local attacker with shell access can execute arbitrary code — Junos OSCWE-653 4.4 Medium2025-03-12
CVE-2024-39564 Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to RPD crash — Junos OSCWE-415 7.5 High2025-02-05
CVE-2025-21598 Junos OS and Junos OS Evolved: When BGP traceoptions are configured, receipt of malformed BGP packets causes RPD to crash — Junos OSCWE-125 7.5 High2025-01-09
CVE-2025-21600 Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-125 6.5 Medium2025-01-09
CVE-2025-21602 Junos OS and Junos OS Evolved: Receipt of specially crafted BGP update packet causes RPD crash — Junos OSCWE-755 6.5 Medium2025-01-09
CVE-2025-21599 Junos OS Evolved: Receipt of specifically malformed IPv6 packets causes kernel memory exhaustion leading to Denial of Service — Junos OS EvolvedCWE-401 7.5 High2025-01-09
CVE-2025-21596 Junos OS: SRX1500,SRX4100,SRX4200: Execution of low-privileged CLI command results in chassisd crash — Junos OSCWE-755 5.5 Medium2025-01-09
CVE-2025-21593 Junos OS and Junos OS Evolved: On SRv6 enabled devices, an attacker sending a malformed BGP update can cause the rpd to crash — Junos OSCWE-664 6.5 Medium2025-01-09
CVE-2025-21592 Junos OS: SRX Series: Low privileged user able to access highly sensitive information on file system — Junos OSCWE-200 5.5 Medium2025-01-09
CVE-2024-47507 Junos OS and Junos OS Evolved: BGP update message containing aggregator attribute with an ASN value of zero (0) is accepted — Junos OSCWE-754 5.8 Medium2024-10-11
CVE-2024-47506 Junos OS: SRX Series: A large amount of traffic being processed by ATP Cloud can lead to a PFE crash — Junos OSCWE-833 5.9 Medium2024-10-11
CVE-2024-47509 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #3 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11
CVE-2024-47508 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #2 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.