Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2024-39561 Junos OS: SRX4600, SRX5000 Series: TCP packets with SYN/FIN or SYN/RST are transferred after enabling no-syn-check with Express Path — Junos OSCWE-754 5.8 Medium2024-07-10
CVE-2024-39560 Junos OS and Junos OS Evolved: Memory leak due to RSVP neighbor persistent error leading to kernel crash — Junos OSCWE-755 6.5 Medium2024-07-10
CVE-2024-39559 Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled — Junos OS EvolvedCWE-754 5.9 Medium2024-07-10
CVE-2024-39558 Junos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR — Junos OSCWE-252 6.5 Medium2024-07-10
CVE-2024-39557 Junos OS Evolved: MAC table changes cause a memory leak — Junos OS EvolvedCWE-400 6.5 Medium2024-07-10
CVE-2024-39556 Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow — Junos OSCWE-121 6.4 Medium2024-07-10
CVE-2024-39555 Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP update causes the session to reset — Junos OSCWE-755 7.5 High2024-07-10
CVE-2024-39554 Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash — Junos OSCWE-362 5.9 Medium2024-07-10
CVE-2024-21586 Junos OS: SRX Series and NFX Series: Specific valid traffic leads to a PFE crash — Junos OSCWE-754 7.5 High2024-07-01
CVE-2024-2973 Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed — Session Smart RouterCWE-288 10.0 Critical2024-06-27
CVE-2024-30380 Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV — Junos OSCWE-755 6.5 Medium2024-04-16
CVE-2024-30378 Junos OS: MX Series: bbe-smgd process crash upon execution of specific CLI commands — Junos OSCWE-416 5.5 Medium2024-04-16
CVE-2024-30403 Junos OS Evolved: When MAC learning happens, and an interface gets flapped, the PFE crashes — Junos OS EvolvedCWE-476 6.5 Medium2024-04-12
CVE-2024-30402 Junos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a specific subscription — Junos OSCWE-754 5.9 Medium2024-04-12
CVE-2024-30401 Junos OS: MX Series and EX9200-15C: Stack-based buffer overflow in aftman — Junos OSCWE-125 5.9 Medium2024-04-12
CVE-2024-30398 Junos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an eventual PFE crash — Junos OSCWE-119 7.5 High2024-04-12
CVE-2024-30397 Junos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process — Junos OSCWE-754 7.5 High2024-04-12
CVE-2024-30391 Junos OS: MX Series with SPC3, and SRX Series: When IPsec authentication is configured with "hmac-sha-384" and "hmac-sha-512" no authentication of traffic is performed — Junos OSCWE-306 4.8 Medium2024-04-12
CVE-2024-30390 Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced — Junos OS EvolvedCWE-307 5.3 Medium2024-04-12
CVE-2024-30389 Junos OS: EX4300 Series: Firewall filter not blocking egress traffic — Junos OSCWE-696 5.8 Medium2024-04-12
CVE-2024-30386 Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash — Junos OSCWE-416 5.3 Medium2024-04-12
CVE-2024-30384 Junos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur — Junos OSCWE-754 5.5 Medium2024-04-12
CVE-2024-30382 Junos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured — Junos OSCWE-755 7.5 High2024-04-12
CVE-2024-30387 Junos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash — Junos OSCWE-820 6.5 Medium2024-04-12
CVE-2024-30388 Junos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps — Junos OS 6.5 Medium2024-04-12
CVE-2024-30392 Junos OS: MX Series with SPC3 and MS-MPC/-MIC: When URL filtering is enabled and a specific URL request is received a flowd crash occurs — Junos OSCWE-121 7.5 High2024-04-12
CVE-2024-30394 Junos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash — Junos OSCWE-121 7.5 High2024-04-12
CVE-2024-30395 Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash — Junos OSCWE-1287 7.5 High2024-04-12
CVE-2024-30405 Junos OS: SRX 5000 Series with SPC2: Processing of specific crafted packets when ALG is enabled causes a transit traffic Denial of Service — Junos OSCWE-131 7.5 High2024-04-12
CVE-2024-30406 Junos OS Evolved: ACX Series with Paragon Active Assurance Test Agent: A local high privileged attacker can recover other administrators credentials — Junos OS EvolvedCWE-313 5.5 Medium2024-04-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.