Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2024-30409 Junos OS and Junos OS Evolved: Higher CPU consumption on routing engine leads to Denial of Service (DoS). — Junos OSCWE-754 5.3 Medium2024-04-12
CVE-2024-30410 Junos OS: EX4300 Series: Loopback filter not blocking traffic despite having discard term. — JunosCWE-696 5.8 Medium2024-04-12
CVE-2024-30381 Paragon Active Assurance: probe_serviced exposes internal objects to local users — Paragon Active AssuranceCWE-200 8.4 High2024-04-12
CVE-2024-21618 Junos OS and Junos OS Evolved: When LLDP is enabled and a malformed LLDP packet is received, l2cpd crashes — Junos OSCWE-788 6.5 Medium2024-04-12
CVE-2024-21615 Junos OS and Junos OS Evolved: A low-privileged user can access confidential information — Junos OSCWE-276 5.0 Medium2024-04-12
CVE-2024-21610 Junos OS: If in a scaled CoS scenario information on CoS state is gathered mgd processes get stuck — Junos OSCWE-755 4.3 Medium2024-04-12
CVE-2024-21609 Junos OS: MX Series with SPC3, and SRX Series: If specific IPsec parameters are negotiated iked will crash due to a memory leak — Junos OSCWE-401 6.5 Medium2024-04-12
CVE-2024-21605 Junos OS: SRX 300 Series: Specific link local traffic causes a control plane overload — Junos OSCWE-668 6.5 Medium2024-04-12
CVE-2024-21598 Junos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash — Junos OSCWE-1286 7.5 High2024-04-12
CVE-2024-21593 Junos OS: MX Series with MPC10, MPC11, LC9600, and MX304: A specific MPLS packet will cause a PFE crash — Junos OSCWE-703 6.5 Medium2024-04-12
CVE-2024-21590 Junos OS Evolved: Packets which are not destined to the device can reach the RE — Junos OS EvolvedCWE-20 5.3 Medium2024-04-12
CVE-2024-21620 Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS — Junos OSCWE-79 8.8 High2024-01-25
CVE-2024-21619 Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information — Junos OSCWE-306 5.3 Medium2024-01-25
CVE-2024-21617 Junos OS: BGP flap on NSR-enabled devices causes memory leak — Junos OSCWE-459 6.5 Medium2024-01-12
CVE-2024-21616 Junos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allocation to fail — Junos OSCWE-1286 7.5 High2024-01-12
CVE-2024-21614 Junos OS and Junos OS Evolved: A specific query via DREND causes rpd crash — Junos OSCWE-754 7.5 High2024-01-12
CVE-2024-21613 Junos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd crash — Junos OSCWE-401 6.5 Medium2024-01-12
CVE-2024-21612 Junos OS Evolved: Specific TCP traffic causes OFP core and restart of RE — Junos OS EvolvedCWE-228 7.5 High2024-01-12
CVE-2024-21611 Junos OS and Junos OS Evolved: In a jflow scenario continuous route churn will cause a memory leak and eventually an rpd crash — Junos OSCWE-401 7.5 High2024-01-12
CVE-2024-21607 Junos OS: MX Series and EX9200 Series: If the "tcp-reset" option used in an IPv6 filter, matched packets are accepted instead of rejected — Junos OSCWE-447 5.3 Medium2024-01-12
CVE-2024-21606 Junos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flowd will crash — Junos OSCWE-415 7.5 High2024-01-12
CVE-2024-21604 Junos OS Evolved: A high rate of specific traffic will cause a complete system outage — Junos OS EvolvedCWE-770 7.5 High2024-01-12
CVE-2024-21603 Junos OS: MX Series: Gathering statistics in a scaled SCU/DCU configuration will lead to a device crash — Junos OSCWE-754 6.5 Medium2024-01-12
CVE-2024-21602 Junos OS Evolved: ACX7024, ACX7100-32C and ACX7100-48L: Traffic stops when a specific IPv4 UDP packet is received by the RE — Junos OS EvolvedCWE-476 7.5 High2024-01-12
CVE-2024-21601 Junos OS: SRX Series: Due to an error in processing TCP events flowd will crash — Junos OSCWE-362 5.9 Medium2024-01-12
CVE-2024-21600 Junos OS: PTX Series: In an FTI scenario MPLS packets hitting reject next-hop will cause a host path wedge condition — Junos OSCWE-76 6.5 Medium2024-01-12
CVE-2024-21599 Junos OS: MX Series: MPC3E memory leak with PTP configuration — Junos OSCWE-401 6.5 Medium2024-01-12
CVE-2024-21597 Junos OS: MX Series: In an AF scenario traffic can bypass configured lo0 firewall filters — Junos OSCWE-668 5.3 Medium2024-01-12
CVE-2024-21596 Junos OS and Junos OS Evolved: A specific BGP UPDATE message will cause a crash in the backup Routing Engine in NSR-enabled devices — Junos OSCWE-122 5.3 Medium2024-01-12
CVE-2024-21595 Junos OS: EX4100, EX4400, EX4600, QFX5000 Series: A high rate of specific ICMP traffic will cause the PFE to hang — Junos OSCWE-1286 7.5 High2024-01-12

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.