Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

Found 658 results / 893Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-30382 Junos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured — Junos OSCWE-755 7.5 High2024-04-12
CVE-2024-30387 Junos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash — Junos OSCWE-820 6.5 Medium2024-04-12
CVE-2024-30388 Junos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps — Junos OS 6.5 Medium2024-04-12
CVE-2024-30392 Junos OS: MX Series with SPC3 and MS-MPC/-MIC: When URL filtering is enabled and a specific URL request is received a flowd crash occurs — Junos OSCWE-121 7.5 High2024-04-12
CVE-2024-30394 Junos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash — Junos OSCWE-121 7.5 High2024-04-12
CVE-2024-30395 Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash — Junos OSCWE-1287 7.5 High2024-04-12
CVE-2024-30405 Junos OS: SRX 5000 Series with SPC2: Processing of specific crafted packets when ALG is enabled causes a transit traffic Denial of Service — Junos OSCWE-131 7.5 High2024-04-12
CVE-2024-30409 Junos OS and Junos OS Evolved: Higher CPU consumption on routing engine leads to Denial of Service (DoS). — Junos OSCWE-754 5.3 Medium2024-04-12
CVE-2024-21618 Junos OS and Junos OS Evolved: When LLDP is enabled and a malformed LLDP packet is received, l2cpd crashes — Junos OSCWE-788 6.5 Medium2024-04-12
CVE-2024-21615 Junos OS and Junos OS Evolved: A low-privileged user can access confidential information — Junos OSCWE-276 5.0 Medium2024-04-12
CVE-2024-21610 Junos OS: If in a scaled CoS scenario information on CoS state is gathered mgd processes get stuck — Junos OSCWE-755 4.3 Medium2024-04-12
CVE-2024-21609 Junos OS: MX Series with SPC3, and SRX Series: If specific IPsec parameters are negotiated iked will crash due to a memory leak — Junos OSCWE-401 6.5 Medium2024-04-12
CVE-2024-21605 Junos OS: SRX 300 Series: Specific link local traffic causes a control plane overload — Junos OSCWE-668 6.5 Medium2024-04-12
CVE-2024-21598 Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash — Junos OSCWE-1286 7.5 High2024-04-12
CVE-2024-21593 Junos OS: MX Series with MPC10, MPC11, LC9600, and MX304: A specific MPLS packet will cause a PFE crash — Junos OSCWE-703 6.5 Medium2024-04-12
CVE-2024-21620 Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS — Junos OSCWE-79 8.8 High2024-01-25
CVE-2024-21619 Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information — Junos OSCWE-306 5.3 Medium2024-01-25
CVE-2024-21617 Junos OS: BGP flap on NSR-enabled devices causes memory leak — Junos OSCWE-459 6.5 Medium2024-01-12
CVE-2024-21616 Junos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allocation to fail — Junos OSCWE-1286 7.5 High2024-01-12
CVE-2024-21614 Junos OS and Junos OS Evolved: A specific query via DREND causes rpd crash — Junos OSCWE-754 7.5 High2024-01-12
CVE-2024-21613 Junos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd crash — Junos OSCWE-401 6.5 Medium2024-01-12
CVE-2024-21611 Junos OS and Junos OS Evolved: In a jflow scenario continuous route churn will cause a memory leak and eventually an rpd crash — Junos OSCWE-401 7.5 High2024-01-12
CVE-2024-21607 Junos OS: MX Series and EX9200 Series: If the "tcp-reset" option used in an IPv6 filter, matched packets are accepted instead of rejected — Junos OSCWE-447 5.3 Medium2024-01-12
CVE-2024-21606 Junos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flowd will crash — Junos OSCWE-415 7.5 High2024-01-12
CVE-2024-21603 Junos OS: MX Series: Gathering statistics in a scaled SCU/DCU configuration will lead to a device crash — Junos OSCWE-754 6.5 Medium2024-01-12
CVE-2024-21601 Junos OS: SRX Series: Due to an error in processing TCP events flowd will crash — Junos OSCWE-362 5.9 Medium2024-01-12
CVE-2024-21600 Junos OS: PTX Series: In an FTI scenario MPLS packets hitting reject next-hop will cause a host path wedge condition — Junos OSCWE-76 6.5 Medium2024-01-12
CVE-2024-21599 Junos OS: MX Series: MPC3E memory leak with PTP configuration — Junos OSCWE-401 6.5 Medium2024-01-12
CVE-2024-21597 Junos OS: MX Series: In an AF scenario traffic can bypass configured lo0 firewall filters — Junos OSCWE-668 5.3 Medium2024-01-12
CVE-2024-21596 Junos OS and Junos OS Evolved: A specific BGP UPDATE message will cause a crash in the backup Routing Engine in NSR-enabled devices — Junos OSCWE-122 5.3 Medium2024-01-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.