Latest juniper ex2300 Vulnerabilities

Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS
Juniper Networks Junos OS
Juniper Networks SRX Series
Juniper Networks EX Series
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 190 more
Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information
Juniper Networks Junos OS
Juniper Networks SRX Series
Juniper Networks EX Series
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 197 more
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600 a...
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 87 more
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all Junos OS...
Juniper JUNOS=21.1
Juniper JUNOS=21.1-r1
Juniper JUNOS=21.1-r1-s1
Juniper JUNOS=21.1-r2
Juniper JUNOS=21.1-r2-s1
Juniper JUNOS=21.1-r2-s2
and 86 more
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 366 more
Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability
Juniper Networks SRX Series firewall
Juniper Networks EX Series switch
Juniper Junos OS
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 177 more
Juniper Junos OS EX Series PHP External Variable Modification Vulnerability
Juniper Networks SRX Series firewall
Juniper Networks EX Series switch
Juniper Junos OS
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 177 more
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 178 more
Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 446 more
An Improper Preservation of Consistency Between Independent Representations of Shared State vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a locally authentica...
Juniper JUNOS<18.4
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
Juniper JUNOS=18.4-r1-s2
Juniper JUNOS=18.4-r1-s3
and 178 more
An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privilege...
Juniper JUNOS<19.2
Juniper JUNOS=19.2
Juniper JUNOS=19.2-r1
Juniper JUNOS=19.2-r1-s1
Juniper JUNOS=19.2-r1-s2
Juniper JUNOS=19.2-r1-s3
and 194 more
An Improper Check for Unusual or Exceptional Conditions vulnerability in the processing of specific IPv6 packets on certain EX Series devices may lead to exhaustion of DMA memory causing a Denial of S...
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
Juniper JUNOS=18.4-r1-s2
Juniper JUNOS=18.4-r1-s3
Juniper JUNOS=18.4-r1-s4
and 132 more
An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 and EX4300 Series platforms allows an adjacent attacker sending a stream of layer 2 frames will trigge...
Juniper JUNOS<18.1
Juniper JUNOS=18.1
Juniper JUNOS=18.1-r
Juniper JUNOS=18.1-r1
Juniper JUNOS=18.1-r2
Juniper JUNOS=18.1-r2-s1
and 334 more
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unrespons...
Juniper JUNOS<18.1
Juniper JUNOS=18.1
Juniper JUNOS=18.1-r
Juniper JUNOS=18.1-r1
Juniper JUNOS=18.1-r2
Juniper JUNOS=18.1-r2-s1
and 164 more
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Co...
Juniper JUNOS>=5.7<15.1
Juniper JUNOS>=15.2<18.4
Juniper JUNOS=5.6-r1
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
and 296 more
A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user session...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r10
Juniper JUNOS=12.3-r10-s1
Juniper JUNOS=12.3-r10-s2
Juniper JUNOS=12.3-r11
and 313 more
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated at...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r10
Juniper JUNOS=12.3-r10-s1
Juniper JUNOS=12.3-r10-s2
Juniper JUNOS=12.3-r11
and 318 more
A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d20
Juniper JUNOS=14.1x53-d25
and 262 more
A vulnerability in processing of certain DHCP packets from adjacent clients on EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP local/relay server configured may lead to e...
Juniper JUNOS=17.4-r3
Juniper JUNOS=17.4-r3-s1
Juniper JUNOS=17.4-r3-s2
Juniper JUNOS=18.1-r3-s10
Juniper JUNOS=18.1-r3-s7
Juniper JUNOS=18.1-r3-s8
and 67 more
A vulnerability in Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloa...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d25
Juniper JUNOS=14.1x53-d26
and 215 more
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message ...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
Juniper JUNOS=17.3-r2-s2
Juniper JUNOS=17.3-r2-s3
and 330 more
An improper interpretation conflict of certain data between certain software components within the Juniper Networks Junos OS devices does not allow certain traffic to pass through the device upon rece...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
Juniper JUNOS=17.3-r2-s2
Juniper JUNOS=17.3-r2-s3
and 117 more
On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when m...
Juniper JUNOS=18.1
Juniper JUNOS=18.1-r1
Juniper JUNOS=18.1-r2
Juniper JUNOS=18.1-r2-s1
Juniper JUNOS=18.1-r2-s2
Juniper JUNOS=18.1-r2-s4
and 87 more
A vulnerability in the BGP FlowSpec implementation may cause a Juniper Networks Junos OS device to terminate an established BGP session upon receiving a specific BGP FlowSpec advertisement. The BGP NO...
Juniper JUNOS=12.3
Juniper JUNOS=15.1
Juniper JUNOS=15.1-f
Juniper JUNOS=15.1-f1
Juniper JUNOS=15.1-f2
Juniper JUNOS=15.1-f2-s1
and 241 more
On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password. This issue might only occur in certa...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d25
Juniper JUNOS=14.1x53-d26
and 212 more
Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative acti...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r11
Juniper JUNOS=12.3-r12
Juniper JUNOS=12.3-r12-s1
Juniper JUNOS=12.3-r12-s10
and 242 more
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Ser...
Juniper JUNOS=18.1-r3-s4
Juniper JUNOS=18.3-r1-s3
Juniper Ex2300
Juniper Ex2300-c
Juniper Ex3400
A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrativ...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r11
Juniper JUNOS=12.3-r12
Juniper JUNOS=12.3-r12-s13
Juniper JUNOS=12.3-r12-s14
and 233 more
In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By continuously sending a specially crafted SNMP packet, an attacker c...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 215 more
On EX2300 and EX3400 series, high disk I/O operations may disrupt the communication between the routing engine (RE) and the packet forwarding engine (PFE). In a virtual chassis (VC) deployment, this i...
Juniper JUNOS=15.1x53-d50
Juniper JUNOS=15.1x53-d51
Juniper JUNOS=15.1x53-d52
Juniper JUNOS=15.1x53-d55
Juniper JUNOS=15.1x53-d57
Juniper JUNOS=15.1x53-d58
and 6 more
A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Cha...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d25
Juniper JUNOS=14.1x53-d26
and 50 more
When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, ca...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 118 more
On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. This issue may allow IPv6 packets that should have been b...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d25
Juniper JUNOS=14.1x53-d26
and 95 more
On EX2300 and EX3400 series, stateless firewall filter configuration that uses the action 'policer' in combination with other actions might not take effect. When this issue occurs, the output of the c...
Juniper JUNOS=15.1x53-d50
Juniper JUNOS=15.1x53-d51
Juniper JUNOS=15.1x53-d52
Juniper JUNOS=15.1x53-d55
Juniper JUNOS=15.1x53-d57
Juniper JUNOS=15.1x53-d58
and 14 more
An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and conn...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 72 more
A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. Affe...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 111 more
If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. Th...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 132 more
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet wil...
Juniper JUNOS=12.1x46-d76
Juniper JUNOS=12.1x46-d77
Juniper JUNOS=12.3x48-d66
Juniper JUNOS=12.3x48-d70
Juniper Srx100
Juniper Srx110
and 132 more
Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attac...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 164 more
Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same sp...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 121 more
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as ...
Embedthis Appweb<7.0.2
Embedthis GoAhead<4.0.1
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
and 426 more
Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. The crafted UDP packets must be encapsulated and meet a very specific packet format to be class...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 127 more
While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affe...
Juniper JUNOS=15.1
Juniper JUNOS=15.1-a1
Juniper JUNOS=15.1-f1
Juniper JUNOS=15.1-f2
Juniper JUNOS=15.1-f2-s1
Juniper JUNOS=15.1-f2-s2
and 90 more
An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are J...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 66 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203