Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2024-39546 Junos OS Evolved: Local low-privilege user can gain root permissions leading to privilege escalation — Junos OS EvolvedCWE-862 7.3 High2024-07-11
CVE-2024-39545 Junos OS: SRX Series, MX Series with SPC3 and NFX350: When VPN tunnels parameters are not configured in specific way the iked process will crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39543 Junos OS and Junos OS Evolved: Receipt of a large RPKI-RTR PDU packet can cause rpd to crash — Junos OSCWE-120 6.5 Medium2024-07-11
CVE-2024-39542 Junos OS and Junos OS Evolved: A malformed CFM packet or specific transit traffic leads to FPC crash — Junos OS 7.5 High2024-07-11
CVE-2024-39541 Junos OS and Junos OS Evolved: Inconsistent information in the TE database can lead to an rpd crash — Junos OSCWE-755 6.5 Medium2024-07-11
CVE-2024-39540 Junos OS: SRX Series, and MX Series with SPC3: Specific valid TCP traffic can cause a pfe crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39539 Junos OS: MX Series: Continuous subscriber logins will lead to a memory leak and eventually an FPC crash — Junos OSCWE-401 5.3 Medium2024-07-11
CVE-2024-39538 Junos OS Evolved: ACX7000 Series: When multicast traffic with a specific (S,G) is received evo-pfemand crashes — Junos OS EvolvedCWE-120 6.5 Medium2024-07-11
CVE-2024-39537 Junos OS Evolved: ACX7000 Series: Ports which have been inadvertently exposed can be reached over the network — Junos OS EvolvedCWE-923 6.5 Medium2024-07-11
CVE-2024-39536 Junos OS and Junos OS Evolved: Flaps of BFD sessions with authentication cause a ppmd memory leak — Junos OSCWE-401 5.3 Medium2024-07-11
CVE-2024-39535 Junos OS Evolved: ACX 7000 Series: When specific traffic is received in a VPLS scenario evo-pfemand crashes — Junos OS EvolvedCWE-754 6.5 Medium2024-07-11
CVE-2024-39533 Junos OS: QFX5000 Series and EX4600 Series: Output firewall filter is not applied if certain match criteria are used — Junos OSCWE-447 5.8 Medium2024-07-11
CVE-2024-39532 Junos OS and Junos OS Evolved: Confidential information in logs can be accessed by another user — Junos OSCWE-532 6.3 Medium2024-07-11
CVE-2024-39531 Junos OS Evolved: ACX 7000 Series: Protocol specific DDoS configuration affects other protocols — Junos OS EvolvedCWE-229 7.5 High2024-07-11
CVE-2024-39530 Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash — Junos OSCWE-754 7.5 High2024-07-11
CVE-2024-39529 Junos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash — Junos OSCWE-134 7.5 High2024-07-11
CVE-2024-39528 Junos OS and Junos OS Evolved: Concurrent deletion of a routing-instance and receipt of an SNMP request cause an RPD crash — Junos OSCWE-416 5.7 Medium2024-07-11
CVE-2024-39524 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39523 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39522 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39521 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39520 Junos OS Evolved: CLI parameter processing issue allows privilege escalation — Junos OS EvolvedCWE-78 7.8 High2024-07-11
CVE-2024-39519 Junos OS Evolved: ACX 7000 Series: Multicast traffic is looped in a multihoming EVPN MPLS scenario — Junos OS EvolvedCWE-754 6.5 Medium2024-07-11
CVE-2024-39518 Junos OS: MX240, MX480, MX960 platforms using MPC10E: Memory leak will be observed when subscribed to a specific subscription on Junos Telemetry Interface — Junos OSCWE-122 7.5 High2024-07-10
CVE-2024-39517 Junos OS and Junos OS Evolved: Upon processing specific L2 traffic, rpd can hang in devices with EVPN/VXLAN configured — Junos OSCWE-754 6.5 Medium2024-07-10
CVE-2024-39514 Junos OS and Junos OS Evolved: Receiving specific traffic on devices with EVPN-VPWS with IGMP-snooping enabled will cause the rpd to crash — Junos OSCWE-703 6.5 Medium2024-07-10
CVE-2024-39513 Junos OS Evolved: Execution of a specific CLI command will cause a crash in the AFT manager — Junos OS EvolvedCWE-20 5.5 Medium2024-07-10
CVE-2024-39512 Junos OS Evolved: User is not logged out when the console cable is disconnected — Junos OS EvolvedCWE-1263 6.6 Medium2024-07-10
CVE-2024-39511 Junos OS: The 802.1X Authentication Daemon crashes on running a specific command — Junos OSCWE-20 5.5 Medium2024-07-10
CVE-2024-39562 Junos OS Evolved: A high rate of SSH connections causes a Denial of Service — Junos OS EvolvedCWE-772 7.5 High2024-07-10

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.