Filter
AND

Versions

20.4-r1
193
19.1-r1
192
19.4-r1
191
19.2-r1
190
19.1-r1-s1
189
20.4-r1-s1
188
19.4-r1-s1
187
19.2-r1-s1
186
18.4-r1
184
19.1-r1-s2
184
19.3-r1
184
19.3-r1-s1
183
19.1
182
19.2-r1-s2
181
18.4
180
19.2
180
18.3-r1-s1
179
19.3
179
19.4-r1-s2
179
18.3-r1
178
18.3
177
19.1-r1-s3
177
18.4-r1-s2
176
20.2-r1
174
19.3-r2
173
20.4-r2
173
18.3-r1-s2
171
19.3-r2-s1
171
21.2-r1
170
18.3-r1-s3
168
18.4-r1-s1
167
19.2-r1-s3
167
19.3-r2-s2
167
19.4-r2
166
20.2-r1-s1
165
17.4
164
17.4-r1
163
20.4-r2-s1
163
18.4-r2
160
19.1-r1-s4
160
20.2-r1-s2
159
20.1-r1
158
21.2-r1-s1
158
18.2
157
19.4-r2-s1
157
18.1
156
19.2-r1-s4
156
21.1-r1
156
18.3-r2
155
18.4-r2-s1
155
21.2
155
19.1-r2
154
19.3-r2-s3
154
20.1-r1-s1
154
20.2-r1-s3
153
20.3-r1
153
17.3
152
18.4-r1-s5
151
18.4-r2-s2
151
21.2-r1-s2
149
17.3-r2
147
18.3-r1-s5
147
18.1-r2
146
20.1-r1-s2
146
17.4-r1-s1
145
17.4-r1-s2
145
17.4-r2
145
18.3-r2-s1
145
20.4-r2-s2
145
18.3-r2-s2
143
17.4-r1-s4
141
18.1-r2-s1
141
18.1-r2-s2
141
18.4-r2-s3
141
19.1-r2-s1
141
20.4
141
21.1-r1-s1
141
21.4-r1
141
18.2-r2-s1
140
19.3-r2-s4
140
19.4-r2-s2
140
20.1-r1-s3
140
20.2-r2
140
21.2-r2
140
21.4-r1-s1
139
17.3-r2-s2
138
18.2-r1-s5
138
18.4-r1-s6
138
18.2-r2-s2
137
18.3-r1-s6
137
20.3-r1-s1
137
17.3-r2-s1
135
17.4-r1-s6
135
17.4-r2-s1
135
18.1-r3
133
17.4-r1-s7
132
18.2-r2-s3
132
20.2-r2-s1
132
21.2-r2-s1
132
21.3-r1
132
21.4
132
20.4-r3
131
21.4-r1-s2
131
18.2-r2-s4
130
19.4-r3
130
17.4-r2-s3
129
18.1-r2-s4
129
18.1-r3-s2
128
18.3-r3
128
18.4-r2-s4
128
20.2-r2-s2
128
21.2-r2-s2
128
17.4-r2-s4
127
18.3-r2-s3
127
19.3-r2-s5
127
18.2-r1
126
18.4-r1-s3
126
18.4-r1-s4
126
19.1-r1-s5
126
19.1-r3
126
19.1-r3-s1
126
20.1-r1-s4
126
17.3-r3-s1
125
18.1-r3-s3
125
18.2-r1-s3
125
17.3-r3-s2
124
19.4-r2-s3
124
21.1-r2
124
21.3-r1-s1
124
17.3-r3-s3
122
15.1x49-d10
121
18.1-r3-s4
121
19.4-r1-s3
121
20.3-r2
121
21.3-r1-s2
121
18.1-r1
120
20.2-r2-s3
120
20.4-r3-s1
120
21.4-r2
120
15.1-r1
118
17.4-r2-s2
118
17.4-r2-s5
118
17.3-r3-s4
117
19.2-r1-s5
117
19.3-r3
117
21.2-r3
117
22.1-r1
117
15.1
116
18.4-r3
116
21.1
116
17.3-r3
115
20.2-r3
115
21.3
115
19.4-r3-s1
114
17.3-r1-s1
113
17.4-r1-s5
113
18.2-r1-s4
113
18.2-r3
113
15.1-f2
112
15.1-r2
112
17.4-r2-s6
112
18.1-r3-s6
112
18.2-r2-s5
112
18.3-r3-s1
112
19.2-r3
112
21.1-r2-s1
112
22.1-r1-s1
112
18.1-r3-s1
111
20.4-r3-s2
111
15.1x49-d20
110
20.3-r2-s1
110
18.2-r3-s1
109
19.1-r3-s2
109
21.3-r2
109
21.4-r2-s1
109
15.1-r3
108
17.4-r2-s7
108
18.1-r3-s7
108
18.4-r3-s1
108
18.2-r2
107
18.2-r2-s6
106
18.3-r1-s4
106
19.2-r2
106
15.1x49-d30
105
17.3-r2-s3
105
17.3-r2-s4
105
20.2-r3-s1
105
21.3-r2-s1
105
16.1-r1
103
18.2-r3-s2
103
18.4-r1-s7
103
20.4-r3-s3
103
21.1-r2-s2
103
21.3-r2-s2
103
12.3x48-d10
102
15.1-f3
102
15.1x49-d35
102
17.4-r2-s8
102
15.1-f4
101
18.4-r3-s2
101
19.4-r3-s2
101
21.4-r2-s2
101
20.1-r2
100
21.2-r3-s1
100
12.1x46
98
18.4-r3-s3
98
19.1-r3-s3
98
19.4-r2-s4
98
15.1-r4
97
16.1-r2
97
15.1-f6
96
15.1x49-d40
96
18.1-r3-s8
96
19.2-r3-s1
96
20.1-r2-s1
96
22.1-r1-s2
96
22.2-r1
96
15.1x49-d50
95
17.3-r1
95
18.3-r3-s2
95
12.3x48-d15
94
15.1-f5
94
19.2-r2-s1
94
16.1-r3
93
18.4-r2-s5
93
15.1-f1
92
15.1x49
92
15.1x49-d45
92
20.3-r3
92
22.2-r1-s1
92
21.1-r3
91
17.2
90
12.3
89
15.1x49-d60
89
19.4-r3-s3
89
15.1x49-d55
88
18.3-r2-s4
88
19.2-r1-s6
88
19.4-r1-s4
88
15.1-r6
87
15.1x49-d65
87
19.3-r3-s1
87
20.2
87
21.2-r3-s2
87
22.2-r1-s2
87
14.1x53
86
18.4-r2-s6
86
19.1-r1-s6
86
15.1-f2-s1
85
15.1x49-d70
85
15.1x49-d75
85
17.1-r1
85
17.4-r3
85
21.4-r3
85
15.1x49-d80
84
16.1
84
17.4-r2-s9
84
18.4-r3-s4
84
17.3-r3-s5
83
20.2-r3-s2
83
21.1-r3-s1
83
15.1-f2-s2
82
15.1-f2-s3
82
15.1-f2-s4
82
17.2-r1
82
17.4-r2-s10
82
18.1-r3-s9
82
19.1-r2-s2
82
22.1-r2
82
15.1-r5
81
18.4-r3-s5
81
19.4-r2-s5
81
20.3
81
21.3-r3
81
22.3-r1
81
16.1-r4
80
17.3-r2-s5
80
17.3-r3-s7
80
17.4-r3-s1
80
18.3-r3-s3
80
19.3-r3-s2
78
19.4-r3-s4
78
21.4-r3-s1
78
12.3-r1
77
12.3x48
77
15.1x53-d21
77
15.1x53-d30
77
19.1-r3-s4
77
22.1-r2-s1
77
12.3x48-d25
76
15.1x53-d20
76
15.1x53-d33
76
20.4-r3-s4
76
22.3-r1-s1
76
15.1x49-d90
75
15.1x53-d32
75
17.1
75
21.3-r3-s1
73
15.1-r7
72
17.2-r2
72

The RegisterSomeone is slipping a hidden backdoor into Juniper routers across the globe, activated by a magic packet

First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak

8.7
First published (updated )

Juniper JunosJunos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash

8.7
First published (updated )

Juniper JunosJunos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash

8.7
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: Concurrent deletion of a routing-instance and receipt of an SNMP request cause an RPD crash

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper Networks Junos OSJunos OS and Junos OS Evolved: Upon processing specific L2 traffic, rpd can hang in devices with EVPN/VXLAN configured

7.1
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: Receiving specific traffic on devices with EVPN-VPWS with IGMP-snooping enabled will cause the rpd to crash

7.1
First published (updated )

Juniper JunosJunos OS: The 802.1X Authentication Daemon crashes on running a specific command

First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR

7.1
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow

7.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper Networks Junos OSJunos OS and Junos OS Evolved: Receipt of a specific malformed BGP update causes the session to reset

8.7
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash

8.2
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV

7.1
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a specific subscription

8.2
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an eventual PFE crash

8.7
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process

8.7
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS: EX4300 Series: Firewall filter not blocking egress traffic

EPSS
0.04%
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash

7.1
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur

EPSS
0.04%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured

8.7
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash

7.1
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash

8.7
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash

8.7
EPSS
0.04%
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: Higher CPU consumption on routing engine leads to Denial of Service (DoS).

EPSS
0.04%
First published (updated )

Juniper JunosJunos OS: EX4300 Series: Loopback filter not blocking traffic despite having discard term.

EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper Networks Junos OSJunos OS and Junos OS Evolved: When LLDP is enabled and a malformed LLDP packet is received, l2cpd crashes

7.1
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: A low-privileged user can access confidential information

First published (updated )

Juniper JunosJunos OS: SRX 300 Series: Specific link local traffic causes a control plane overload

7.1
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash

8.7
First published (updated )

Juniper JunosJunos OS: BGP flap on NSR-enabled devices causes memory leak

EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203