Filters

Juniper JUNOSJunos OS: QFX10000 Series: All traffic will be dropped after a specific valid IP packet has been received which needs to be routed over a VXLAN tunnel

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX10002: PFE wedges and restarts upon receipt of specific malformed packets

First published (updated )

Juniper JUNOSJunos OS: QFX10000 Series, PTX1000 Series: The dcpfe process will crash when a malformed ethernet frame is received

First published (updated )

Juniper JUNOSJunos OS: QFX10002: Failure of storm control feature may lead to Denial of Service

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX Series: The PFE may crash when a lot of MAC addresses are being learned and aged

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: PTX Series and QFX10000 Series: An FPC memory leak is observed when specific EVPN VXLAN Multicast packets are processed

First published (updated )

Juniper JUNOSJunos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted packets multiple interfaces in LAG configurations may detach.

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX10K Series: Denial of Service (DoS) upon receipt of crafted MLD packets on multi-homing ESI in VXLAN

First published (updated )

Juniper JUNOSJunos OS: PTX Series and QFX10000 Series: 'Etherleak' memory disclosure in Ethernet padding data

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: QFX Series and PTX Series: FPC resource usage increases when certain packets are processed which are being VXLAN encapsulated

First published (updated )

Juniper JUNOSJunos OS: QFX10K Series: Denial of Service (DoS) upon receipt of DVMRP packets received on multi-homing ESI in VXLAN.

First published (updated )

Juniper JUNOSJunos OS: User-defined ARP Policer isn't applied on Aggregated Ethernet (AE) interface until firewall process is restarted

First published (updated )

Juniper JUNOSJunos OS: PTX Series, QFX10K Series: Upon receipt of specific packets BFD sessions might flap due to DDoS policer implementation in Packet Forwarding Engine

7.5
First published (updated )

Juniper JUNOSJunos OS: PTX Series, QFX10K Series: A PTX/QFX FPC may restart unexpectedly with the "inline-Jflow" feature enabled on a large-scale deployment

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: PTX Series, QFX Series: Due to a race condition input loopback firewall filters applied to interfaces may not operate even when listed in the running configuration.

First published (updated )

Juniper JUNOSJunos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets

7.4
First published (updated )

Juniper JUNOSJunos OS: PTX/QFX Series: Kernel Routing Table (KRT) queue stuck after packet sampling a malformed packet when the tunnel-observation mpls-over-udp configuration is enabled.

7.5
First published (updated )

Juniper JUNOSJunos OS: jdhcpd process crash when forwarding a malformed DHCP packet.

First published (updated )

Juniper JUNOSJunos OS: EX and QFX Series: Console port authentication bypass vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement.

8.6
First published (updated )

Juniper JUNOSJunos OS: Cross-Site Scripting (XSS) in J-Web

7.5
First published (updated )

Juniper JUNOSJunos OS: NFX150 Series, QFX10K Series, EX9200 Series, MX Series, PTX Series: Path traversal vulnerability in NFX150 and NG-RE leads to information disclosure.

First published (updated )

Juniper JUNOSJunos OS: RPD process crashes upon receipt of a specific SNMP packet

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packet

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: EX, QFX and MX series: Packet Forwarding Engine manager (FXPC) process crashes due to a crafted HTTP packet in a Virtual Chassis configuration

First published (updated )

Juniper JUNOSJunos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash.

7.5
First published (updated )

Juniper JUNOSJunos OS: RPD daemon crashes upon receipt of specific MPLS packet

8.8
First published (updated )

Juniper JUNOSJunos OS: QFX5200 and QFX10002: Unintended ONIE partition was shipped with certain Junos OS .bin and .iso images

First published (updated )

Juniper JUNOSJunos OS: A malicious crafted IPv6 DHCP packet may cause the JDHCPD daemon to core

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSSecurity Bulletin: Junos OS: MAC move limit configured to drop traffic may forward traffic.

8.8
First published (updated )

Juniper JUNOSJunos OS: VM to host privilege escalation in platforms with Junos OS running in a virtualized environment.

8.8
First published (updated )

Juniper JUNOSJuniper Junos OS before 13.2X51-D40, 14.x before 14.1X53-D30, and 15.x before 15.1X53-D20 on QFX5100…

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203