Filter
AND
AND
AND

Juniper JUNOSJunos OS and Junos OS Evolved: RPD might crash when MPLS ping is performed on BGP LSPs

First published (updated )

Juniper JUNOSJunos OS: MX Series: An FPC crash might be seen due to mac-moves within the same bridge domain

First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: In an MPLS scenario upon receipt of a specific IPv6 packet an FPC will crash

First published (updated )

Juniper JUNOSJunos OS: EX4300: PFE Denial of Service (DoS) upon receipt of a flood of specific ARP traffic

First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: OSPFv3 session might go into INIT state upon receipt of multiple crafted packets from a trusted neighbor device.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: When using J-Web with HTTP an attacker may retrieve encryption keys via Person-in-the-Middle attacks.

First published (updated )

Juniper JUNOSJunos OS: EX2300, EX3400 and EX4300 Series: An Aggregated Ethernet (AE) interface will go down due to a stream of specific layer 2 frames

First published (updated )

Juniper JUNOSJunos OS: A local authenticated attacker can cause RPD to core

First published (updated )

Juniper JUNOSJunos OS: MX Series: In subscriber management / BBE configuration authd can crash if a subscriber with a specific username tries to login leading to a DoS

First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: A vulnerability allows a network based unauthenticated attacker which sends a high rate of specific traffic to cause a partial Denial of Service

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces.

First published (updated )

Juniper JUNOSJunos OS: EX4300-MP/EX4600/EX4650/QFX5K Series: Packet Forwarding Engine manager (FXPC) process crashes when deployed in a Virtual Chassis (VC) configuration

First published (updated )

Juniper JUNOSJunos OS: MX Series: DDoS LACP violation upon receipt of specific layer 2 frames in EVPN-VXLAN deployment

First published (updated )

Juniper JUNOSJunos OS: PTX Series, QFX Series: Due to a race condition input loopback firewall filters applied to interfaces may not operate even when listed in the running configuration.

First published (updated )

Juniper JUNOSJunos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: MX Series: MS-MPC/MIC might crash when processing malformed IPv6 packet in NAT64 configuration.

First published (updated )

Juniper JUNOSJunos OS: jdhcpd process crash when forwarding a malformed DHCP packet.

First published (updated )

Juniper JUNOSJunos OS: EX Series: RPD crash when executing specific "show ospf interface" commands from the CLI with OSPF authentication configured

First published (updated )

Juniper JUNOSJunos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and an LLDP crash.

First published (updated )

Juniper JUNOSJunos OS: Privilege escalation vulnerability in dual REs, VC or HA cluster may allow unauthorized configuration change.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: EX4300: Traffic from the network internal to the device (128.0.0.0) may be forwarded to egress interfaces

First published (updated )

Juniper JUNOSJunos OS: EX and QFX Series: Console port authentication bypass vulnerability

First published (updated )

Juniper JUNOSJunos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets

First published (updated )

Juniper JUNOSJunos OS: vSRX, SRX1500, SRX4K, ACX5K, EX4600, QFX5100, QFX5110, QFX5200, QFX10K and NFX Series: console management port device authentication credentials are logged in clear text

First published (updated )

Juniper JUNOSOn EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform pack…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSQFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames

First published (updated )

Juniper JUNOSMX Series: L2ALD daemon may crash if a duplicate MAC is learned by two different interfaces

First published (updated )

Juniper JUNOSJunos OS: bbe-smgd process denial of service while processing VLAN authentication requests/rejects

First published (updated )

Juniper JUNOSJunos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with 'extended-statistics' enabled

First published (updated )

Juniper JUNOSJunos: RPD core due to BGP UPDATE with malformed optional transitive attributes

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203