Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved 20.1 vulnerabilities and exploits
(subscribe to this query)
2.9
CVSSv2
CVE-2020-1678
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task...
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
5
CVSSv2
CVE-2021-0264
A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of...
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos Os Evolved 18.3
Juniper Junos Os Evolved 19.1
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.2
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.4
5
CVSSv2
CVE-2020-1648
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet ca...
Juniper Junos 18.2x75
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
5.4
CVSSv2
CVE-2021-31354
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an malicious user to cause a partial Den...
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
Juniper Junos 20.4
Juniper Junos Os Evolved 20.4
Juniper Junos 21.1
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
NA
CVE-2023-22407
An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated malicious user to cause a Denial of Service (DoS). An rpd crash can occur when an MPLS TE tunnel configuration change occ...
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.2
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved
3.3
CVSSv2
CVE-2021-31363
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent malicious user to cause high load on RPD which in turn may lead to routing pr...
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 19.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
4.3
CVSSv2
CVE-2021-31383
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets processed by the routing protocol dae...
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
7.2
CVSSv2
CVE-2020-1666
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to r...
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
3.3
CVSSv2
CVE-2020-1681
Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a c...
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
9
CVSSv2
CVE-2021-31350
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated malicious user to perform operations as root, leading to c...
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 18.3
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
Juniper Junos 20.4
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 21.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »