📦 Junos Os Evolved
by Juniper
🔍 What is Junos Os Evolved?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows attackers to send specially crafted BGP FlowSpec messages that cause route advertisement disruptions, leading to denial of s...
A use-after-free vulnerability in Juniper's 802.1X authentication daemon (dot1xd) allows authenticated, network-adjacent attackers to crash the daemon or potentially execute arbitrary code as root. Th...
A vulnerability in Juniper's DHCP service allows a DHCP client in one subnet to exhaust address pools in other subnets, causing Denial of Service on downstream DHCP servers. This affects Junos OS and ...
A buffer over-read vulnerability in Juniper's routing protocol daemon (rpd) allows unauthenticated attackers to cause denial-of-service by sending specially crafted BGP updates. The vulnerability affe...
An unauthenticated network attacker can cause a denial-of-service by sending a specific BGP EVPN update message to Juniper Junos OS and Junos OS Evolved devices, crashing the routing protocol daemon. ...
A Missing Authorization vulnerability in Juniper Networks Junos OS Evolved allows local low-privileged users to gain root privileges by sending packets over the internal VRF. This enables arbitrary co...
An unauthenticated adjacent attacker can send a malformed DHCP packet to crash the Juniper DHCP daemon (jdhcpd) when dhcp-security is enabled, causing DHCP service denial. The service automatically re...
An unauthenticated network attacker can send a specific ICMPv6 packet to cause the routing protocol daemon (rpd) to crash and restart, leading to denial of service. This affects Juniper Networks Junos...
A double-free vulnerability in Juniper Junos OS and Junos OS Evolved routing process daemon (rpd) allows attackers to cause denial of service by sending malformed BGP path attribute updates. This affe...
An out-of-bounds read vulnerability in Juniper Junos OS and Junos OS Evolved routing protocol daemon (rpd) allows unauthenticated attackers to crash the daemon by sending malformed BGP packets when pa...
This CVE describes a memory leak vulnerability in Juniper's Tunnel Driver (jtd) on Junos OS Evolved. Unauthenticated attackers can send specially crafted IPv6 packets to cause kernel memory exhaustion...
An unauthenticated network attacker can cause a denial of service (DoS) on Juniper Junos OS Evolved by exploiting a resource exhaustion vulnerability in the kernel. The vulnerability occurs when termi...
An unauthenticated attacker can cause denial of service by sending a specially crafted BGP update with a malformed AS PATH attribute to Juniper devices running vulnerable Junos OS versions with BMP co...
An unauthenticated attacker can send specific MPLS packets to Juniper ACX 7000 Series devices running vulnerable Junos OS Evolved versions, causing the Packet Forwarding Engine to improperly forward p...
An unauthenticated attacker can send network traffic to Juniper Junos OS Evolved devices to cause uncontrolled memory consumption in the aftmand process, leading to a denial of service. The affected p...
An unauthenticated network attacker can cause denial-of-service on affected Juniper devices by sending specific traffic that crashes critical packet processing components. This affects Juniper MX, ACX...
An improper handling of values vulnerability in Juniper's Packet Forwarding Engine allows unauthenticated network attackers to cause denial-of-service. When DDoS bandwidth/burst parameters are configu...
This vulnerability allows local authenticated users with low privileges on Juniper Junos OS Evolved to escalate to root privileges by executing specific CLI commands with crafted parameters. It affect...
This CVE describes a local privilege escalation vulnerability in Juniper Junos OS Evolved where authenticated low-privilege users can execute specific CLI commands with crafted parameters to gain root...
This CVE describes a local privilege escalation vulnerability in Juniper Networks Junos OS Evolved. An authenticated attacker with low privileges can execute specific CLI commands with crafted paramet...
A resource management vulnerability in xinetd on Juniper Junos OS Evolved allows unauthenticated attackers to cause denial of service by sending high rates of SSH connections. When exploited, xinetd c...
This vulnerability allows remote attackers to cause denial of service by sending specially crafted BGP update messages to Juniper devices with segment routing enabled. Attackers can reset BGP sessions...
This vulnerability allows network-based attackers to cause a denial of service on Juniper devices by sending malicious routing updates that trigger memory corruption in the routing protocol daemon. On...
An unauthenticated network attacker can cause denial of service by sending a specially crafted BGP update with a malformed tunnel encapsulation TLV, causing the Routing Protocol Daemon (RPD) to crash ...
A network-based attacker can cause denial of service by sending a specially crafted BGP update with a malformed tunnel encapsulation TLV to Juniper devices running vulnerable Junos OS versions. This c...
A memory leak vulnerability in Juniper's Routing Protocol Daemon (rpd) allows unauthenticated network attackers to cause denial of service. When BGP next hops update during Juniper Flow Monitoring (jf...
An unauthenticated network attacker can crash the Routing Protocol Daemon (RPD) on Juniper Junos OS and Junos OS Evolved by sending a specific Dynamic Rendering query when NETCONF and gRPC are enabled...
A NULL pointer dereference vulnerability in Juniper Junos OS Evolved allows unauthenticated attackers to cause denial of service by sending specific IPv4 UDP packets. When received by the Routing Engi...
An unauthenticated network attacker can cause a complete and persistent system outage on Juniper Junos OS Evolved by sending a high rate of specific valid packets that exhaust kernel connection tracki...
An improper input validation vulnerability in Juniper Networks Junos OS routing protocol daemon (rpd) allows attackers to cause denial of service by sending malformed ISO VPN BGP UPDATE packets. This ...
An out-of-bounds write vulnerability in Juniper's Routing Protocol Daemon (rpd) allows unauthenticated network attackers to cause denial of service by crashing rpd when processing BGP route updates. T...
An improper input validation vulnerability in Juniper's Routing Protocol Daemon (rpd) allows unauthenticated attackers to cause denial of service by sending crafted BGP UPDATE messages. This affects b...
An improper input validation vulnerability in Juniper's Routing Protocol Daemon (rpd) allows unauthenticated attackers to cause BGP session flaps and sustained denial of service by sending specially c...
This CVE allows local authenticated attackers on Juniper Junos OS Evolved systems to execute administrative commands through the 'sysmanctl' shell command, bypassing proper authorization checks. Attac...
This vulnerability allows an unauthenticated network attacker to cause a memory leak in Juniper's routing protocol daemon (rpd) during BGP rib sharding scenarios, leading to eventual denial of service...
This CVE allows a local authenticated low-privileged attacker to copy malicious files into existing Docker containers on Juniper Junos OS Evolved systems. When an administrator later starts the contai...
This vulnerability allows an unauthenticated attacker to crash the routing protocol daemon (RPD) on Juniper devices by sending a malformed BGP flowspec update, causing a denial of service. Continued e...
This vulnerability allows a local attacker with shell access and low privileges to modify system files or execute commands as root due to improper file permissions. It affects Juniper Networks Junos O...
This CVE describes an unauthenticated resource exhaustion vulnerability in Juniper Junos OS Evolved's Packet Forwarding Engine. An attacker can send high rates of specific hostbound traffic to cause a...
A stack-based buffer overflow vulnerability in Juniper's routing protocol daemon (RPD) allows remote unauthenticated attackers to crash the RPD service by sending specially crafted packets in P2MP sce...
This vulnerability allows remote attackers to cause a denial of service on Juniper Networks devices by sending specially crafted BGP UPDATE or KEEPALIVE messages. The routing process daemon (RPD) cras...
A Use After Free vulnerability in Juniper's chassis daemon allows authenticated low-privilege attackers to cause denial-of-service by repeatedly subscribing/unsubscribing telemetry collectors. This af...
An incorrect calculation vulnerability in Juniper's Layer 2 Control Protocol Daemon (l2cpd) allows unauthenticated network-adjacent attackers to cause denial of service by flapping the management inte...
This CVE describes a memory leak vulnerability in Juniper's routing protocol daemon (rpd) that allows an adjacent IS-IS neighbor to send malicious update packets causing memory exhaustion. Continued e...
A local untrusted pointer dereference vulnerability in Juniper Junos OS routing protocol daemon allows authenticated low-privilege users to cause denial-of-service by executing specific 'show route' c...
A local privilege escalation vulnerability in Juniper's DHCP daemon allows any authenticated user, regardless of privileges, to connect to the management Unix socket and issue administrative commands....
An unauthenticated network attacker can send a specific BGP attribute to Juniper Junos devices, causing them to modify it incorrectly before forwarding to peers. This malformed attribute causes peers ...
This vulnerability allows authenticated network-based attackers to bypass password expiration policies on Juniper Junos OS and Junos OS Evolved devices. When a RADIUS server rejects a login due to an ...
An uninitialized pointer access vulnerability in Juniper's routing protocol daemon (rpd) with BGP sharding enabled allows attackers to cause route resolution churn through IGP route changes, leading t...
An unauthenticated adjacent attacker can cause denial-of-service on affected Juniper PTX devices by sending specific valid CFM traffic that spikes CPU to 100% and causes memory leaks, eventually crash...
An unauthenticated network attacker can send specially crafted packets to PTX Series routers running vulnerable Junos OS Evolved versions, causing resource exhaustion on the Routing Engine and potenti...
A local privilege escalation vulnerability in Juniper Junos OS and Junos OS Evolved allows high-privileged local attackers to execute arbitrary commands as root by crafting malicious arguments to the ...
A Juniper Junos OS Evolved firewall filter vulnerability allows unauthenticated network attackers to bypass security restrictions when prefix lists with more than 10 entries are used. This affects fir...
A reachable assertion vulnerability in Juniper Junos OS and Junos OS Evolved routing protocol daemon allows adjacent unauthenticated attackers to cause denial of service by crashing rpd during BGP ses...
An unauthenticated network attacker can cause a denial of service by sending a specific BGP UPDATE packet to Juniper devices running vulnerable Junos OS versions. This causes the routing protocol daem...
A vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent BGP peer to crash the routing protocol daemon (rpd) by sending a specifically malformed BGP packet, causin...
An expired pointer dereference vulnerability in Juniper's Routing Protocol Daemon (rpd) allows adjacent attackers to cause denial of service by triggering MPLS LSP flapping. This affects Junos OS and ...
A local privilege escalation vulnerability in Juniper Junos OS and Junos OS Evolved allows low-privileged users to cause a denial-of-service by running a specific BGP show command. This affects device...
A signed-to-unsigned conversion error in Juniper's Layer 2 Control Protocol daemon (l2cpd) allows an unauthenticated adjacent attacker to cause a denial of service by sending a specifically malformed ...
An unauthenticated, logically adjacent BGP peer can cause a denial of service by triggering a crash and restart of the routing protocol daemon (rpd) in Juniper Junos OS and Junos OS Evolved. This occu...
An unauthenticated attacker can send malformed BGP UPDATE packets to Juniper devices with SRv6 enabled, causing the routing protocol daemon (rpd) to crash and restart, leading to denial of service. Th...
An out-of-bounds read vulnerability in Juniper's routing protocol daemon (rpd) allows unauthenticated, adjacent BGP peers to crash the service by sending malformed BGP packets, causing denial of servi...
This CVE describes a resource exhaustion vulnerability in Juniper Junos OS Evolved where authenticated attackers can cause FPC crashes through specific SNMP GET operations or CLI commands. The vulnera...
An authorization bypass vulnerability in Juniper Junos OS Evolved allows locally authenticated attackers with shell access to gain full device control when Dual Routing Engines are configured. This af...
An unauthenticated attacker can send specific transit protocol traffic to Juniper ACX Series devices running vulnerable Junos OS Evolved versions, causing DDoS protection queue exhaustion. This leads ...
A local privilege escalation vulnerability in Juniper Junos OS Evolved allows low-privileged local users to read NETCONF traceoptions files containing sensitive system information. This affects all Ju...
An unauthenticated network attacker can crash the msvcsd process on Juniper Junos OS Evolved devices configured with inline jflow, causing temporary denial of service and potential unauthorized access...
An unauthenticated adjacent attacker can cause a Denial-of-Service (DoS) on Juniper ACX7000 Series routers by sending specific multicast traffic that triggers a buffer overflow in the PFE management d...
A memory leak vulnerability in Juniper's Periodic Packet Management Daemon (ppmd) allows unauthenticated adjacent attackers to cause denial-of-service by exploiting BFD session authentication flaps. T...
An unauthenticated adjacent attacker can exploit a memory leak in Juniper's Layer 2 Address Learning Daemon (l2ald) on Junos OS Evolved to cause system memory exhaustion, leading to a crash and denial...
This vulnerability allows a network-based attacker to crash Juniper Junos OS Evolved devices by sending a specific TCP packet over an established TCP session with MD5 authentication enabled. Only affe...