Latest juniper ptx10016 Vulnerabilities

Junos OS: PTX Series and QFX10000 Series: Received flow-routes which aren't installed as the hardware doesn't support them, lead to an FPC heap memory leak
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 234 more
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MA...
Juniper Junos Os Evolved<21.4
Juniper Junos Os Evolved=21.4
Juniper Junos Os Evolved=21.4-r1
Juniper Junos Os Evolved=21.4-r1-s1
Juniper Junos Os Evolved=21.4-r1-s2
Juniper Junos Os Evolved=21.4-r2
and 38 more
A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauth...
Juniper Junos Os Evolved=21.2
Juniper Junos Os Evolved=21.2-r1
Juniper Junos Os Evolved=21.2-r1-s1
Juniper Junos Os Evolved=21.2-r1-s2
Juniper Junos Os Evolved=21.2-r2
Juniper Junos Os Evolved=21.2-r2-s1
and 55 more
An Improper Validation of Syntactic Correctness of Input vulnerability in the kernel of Juniper Networks Junos OS Evolved on PTX series allows a network-based, unauthenticated attacker to cause a Deni...
Juniper Junos Os Evolved=20.4-r1
Juniper Junos Os Evolved=20.4-r1-s1
Juniper Junos Os Evolved=20.4-r1-s2
Juniper Junos Os Evolved=20.4-r2
Juniper Junos Os Evolved=20.4-r2-s1
Juniper Junos Os Evolved=20.4-r2-s2
and 22 more
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the PFE of Juniper Networks Junos OS on PTX Series and QFX10k Series allows an adjacent unauthenticated attacker to gain ...
Juniper JUNOS<18.4
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
Juniper JUNOS=18.4-r1-s2
Juniper JUNOS=18.4-r1-s3
and 176 more
An Improper Handling of Exceptional Conditions vulnerability on specific PTX Series devices, including the PTX1000, PTX3000 (NextGen), PTX5000, PTX10002-60C, PTX10008, and PTX10016 Series, in Juniper ...
Juniper JUNOS<19.1
Juniper JUNOS=19.1
Juniper JUNOS=19.1-r1
Juniper JUNOS=19.1-r1-s1
Juniper JUNOS=19.1-r1-s2
Juniper JUNOS=19.1-r1-s3
and 150 more
An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unau...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r1-s4
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
and 253 more
A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows an adjacent attacker to cause a Denial of Ser...
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
Juniper JUNOS=18.4-r1-s2
Juniper JUNOS=18.4-r1-s3
Juniper JUNOS=18.4-r1-s4
and 109 more
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Co...
Juniper JUNOS>=5.7<15.1
Juniper JUNOS>=15.2<18.4
Juniper JUNOS=5.6-r1
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
and 296 more
On PTX Series and QFX10k Series devices with the "inline-jflow" feature enabled, a use after free weakness in the Packet Forwarding Engine (PFE) microkernel architecture of Juniper Networks Junos OS m...
Juniper JUNOS=18.1-r2
Juniper JUNOS=18.1-r2-s1
Juniper JUNOS=18.1-r2-s2
Juniper JUNOS=18.1-r2-s4
Juniper JUNOS=18.1-r3
Juniper JUNOS=18.1-r3-s1
and 20 more
A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the f...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d20
Juniper JUNOS=14.1x53-d25
and 328 more
A Data Processing vulnerability in the Multi-Service process (multi-svcs) on the FPC of Juniper Networks Junos OS on the PTX Series routers may lead to the process becoming unresponsive, ultimately af...
Juniper JUNOS=18.2
Juniper JUNOS=18.2-r1
Juniper JUNOS=18.2-r1
Juniper JUNOS=18.2-r1-s2
Juniper JUNOS=18.2-r1-s3
Juniper JUNOS=18.2-r1-s4
and 118 more
This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to th...
Juniper JUNOS=17.4
Juniper JUNOS=17.4-r1
Juniper JUNOS=17.4-r1-s1
Juniper JUNOS=17.4-r1-s2
Juniper JUNOS=17.4-r1-s4
Juniper JUNOS=17.4-r1-s5
and 57 more
On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down. By continuously sending the off...
Juniper JUNOS=17.2x75-d102
Juniper JUNOS=17.2x75-d50
Juniper JUNOS=17.2x75-d70
Juniper JUNOS=17.4
Juniper JUNOS=17.4-r1
Juniper JUNOS=17.4-r2
and 17 more
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as ...
Embedthis Appweb<7.0.2
Embedthis GoAhead<4.0.1
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
and 426 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203