Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2024-47505 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #1 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11
CVE-2024-47504 Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash — Junos OSCWE-1287 7.5 High2024-10-11
CVE-2024-47503 Junos OS: SRX4600 and SRX5000 Series: Sequence of specific PIM packets causes a flowd crash — Junos OSCWE-754 6.5 Medium2024-10-11
CVE-2024-47502 Junos OS Evolved: TCP session state is not always cleared on the Routing Engine leading to DoS — Junos OS EvolvedCWE-770 7.5 High2024-10-11
CVE-2024-47501 Junos OS: MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C: In a VPLS or Junos Fusion scenario specific show commands cause FPCs to crash — Junos OSCWE-476 5.5 Medium2024-10-11
CVE-2024-47499 Junos OS and Junos OS Evolved: In a BMP scenario receipt of a malformed AS PATH attribute can cause an RPD crash — Junos OSCWE-754 7.5 High2024-10-11
CVE-2024-47498 Junos OS Evolved: QFX5000 Series: Configured MAC learning and move limits are not in effect — Junos OS Evolved 6.5 Medium2024-10-11
CVE-2024-47497 Junos OS: SRX Series, QFX Series, MX Series and EX Series: Receiving specific HTTPS traffic causes resource exhaustion — Junos OSCWE-400 7.5 High2024-10-11
CVE-2024-47496 Junos OS: MX Series: The PFE will crash on running specific command — Junos OSCWE-476 5.5 Medium2024-10-11
CVE-2024-47495 Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device. — Junos OS EvolvedCWE-639 6.7 Medium2024-10-11
CVE-2024-47494 Junos OS: Due to a race condition AgentD process causes a memory corruption and FPC reset — Junos OSCWE-367 5.9 Medium2024-10-11
CVE-2024-47493 Junos OS: MX Series: Trio-based FPCs: Continuous physical Interface flaps causes local FPC to crash — Junos OSCWE-401 6.5 Medium2024-10-11
CVE-2024-47491 Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash — Junos OSCWE-755 5.9 Medium2024-10-11
CVE-2024-47490 Junos OS Evolved: ACX 7000 Series: Receipt of specific transit MPLS packets causes resources to be exhausted — Junos OS EvolvedCWE-923 8.2 High2024-10-11
CVE-2024-47489 Junos OS Evolved: ACX Series: Receipt of specific transit protocol packets is incorrectly processed by the RE — Junos OS EvolvedCWE-755 5.8 Medium2024-10-11
CVE-2024-39563 Junos Space: Remote Command Execution (RCE) vulnerability in web application — Junos SpaceCWE-77 7.3 High2024-10-11
CVE-2024-39547 Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization — Junos OSCWE-755 7.5 High2024-10-11
CVE-2024-39544 Junos OS Evolved: Low privileged local user able to view NETCONF traceoptions files — Junos OS EvolvedCWE-276 5.0 Medium2024-10-11
CVE-2024-39534 Junos OS Evolved: Connections to the network and broadcast address accepted — Junos OS EvolvedCWE-697 5.4 Medium2024-10-11
CVE-2024-39527 Junos OS: SRX Series: Low privileged user able to access sensitive information on file system — Junos OSCWE-200 5.5 Medium2024-10-11
CVE-2024-39526 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11/LC9600, MX304, EX9200, PTX Series: Receipt of malformed DHCP packets causes interfaces to stop processing packets — Junos OSCWE-755 6.5 Medium2024-10-11
CVE-2024-39525 Junos OS and Junos OS Evolved: When BGP traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash — Junos OSCWE-755 7.5 High2024-10-09
CVE-2024-39516 Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-125 7.5 High2024-10-09
CVE-2024-39515 Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-1288 7.5 High2024-10-09
CVE-2024-39553 Junos OS Evolved: Receipt of arbitrary data when sampling service is enabled, leads to partial Denial of Service (DoS). — Junos OS EvolvedCWE-668 6.5 Medium2024-07-11
CVE-2024-39552 Junos OS and Junos OS Evolved: Malformed BGP UPDATE causes RPD crash — Junos OSCWE-755 7.5 High2024-07-11
CVE-2024-39551 Junos OS: SRX Series and MX Series with SPC3 and MS-MPC/MIC: Receipt of specific packets in H.323 ALG causes traffic drop — Junos OSCWE-400 7.5 High2024-07-11
CVE-2024-39550 Junos OS: MX Series with SPC3 line card: Port flaps causes rtlogd memory leak leading to Denial of Service — Junos OSCWE-401 6.5 Medium2024-07-11
CVE-2024-39549 Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak — Junos OSCWE-401 7.5 High2024-07-11
CVE-2024-39548 Junos OS Evolved: Receipt of specific packets in the aftmand process will lead to a memory leak — Junos OS EvolvedCWE-400 7.5 High2024-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.