8.4

CVSS4.0

CVE-2025-52988 - Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout'

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root. When a user provides specifically crafted argumen…

📅 Published: July 11, 2025, 3:11 p.m. 🔄 Last Modified: Feb. 26, 2026, 5:50 p.m.

6.9

CVSS4.0

CVE-2025-6549 - Junos OS: SRX Series: J-Web can be exposed on additional interfaces

An Incorrect Authorization vulnerability in the web server of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to reach the Juniper Web Device Manager (J-Web). When Juniper Secure connect (JSC) is enabled on specific interfaces, or multiple interfaces a…

📅 Published: July 11, 2025, 3:11 p.m. 🔄 Last Modified: Jan. 23, 2026, 6:18 p.m.

6.8

CVSS4.0

CVE-2025-52989 - Junos OS and Junos OS Evolved: Annotate configuration command can be used to change the configurati…

An Improper Neutralization of Delimiters vulnerability in the UI of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to modify the system configuration. A user with limited configuration and commit permissions, using a specifically crafte…

📅 Published: July 11, 2025, 3:10 p.m. 🔄 Last Modified: Jan. 23, 2026, 6:18 p.m.

6.8

CVSS4.0

CVE-2025-52986 - Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed…

A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB sharding is enabled and a user executes one o…

📅 Published: July 11, 2025, 3:10 p.m. 🔄 Last Modified: Jan. 30, 2026, 8:42 p.m.

6.9

CVSS4.0

CVE-2025-52985 - Junos OS Evolved: When a control-plane firewall filter refers to a prefix-list with more than 10 en…

A Use of Incorrect Operator vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions. When a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with 'f…

📅 Published: July 11, 2025, 3:09 p.m. 🔄 Last Modified: Jan. 23, 2026, 5:06 p.m.

8.2

CVSS4.0

CVE-2025-52984 - Junos OS and Junos OS Evolved: When a static route points to a reject next-hop and a gNMI query for…

A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device. When static route points to a reject next hop and a gNMI query is pro…

📅 Published: July 11, 2025, 3:09 p.m. 🔄 Last Modified: Jan. 23, 2026, 5:05 p.m.

8.6

CVSS4.0

CVE-2025-52983 - Junos OS: After removing ssh public key authentication root can still log in

A UI Discrepancy for Security Feature vulnerability in the UI of Juniper Networks Junos OS on VM Host systems allows a network-based, unauthenticated attacker to access the device. On VM Host Routing Engines (RE), even if the configured public key for root has been removed, remote users which a…

📅 Published: July 11, 2025, 3:09 p.m. 🔄 Last Modified: Feb. 26, 2026, 5:50 p.m.

8.2

CVSS4.0

CVE-2025-52982 - Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash

An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is configured with two or more service sets whic…

📅 Published: July 11, 2025, 3:08 p.m. 🔄 Last Modified: Jan. 23, 2026, 5:03 p.m.

8.7

CVSS4.0

CVE-2025-52981 - Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash

An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS…

📅 Published: July 11, 2025, 3:08 p.m. 🔄 Last Modified: Jan. 30, 2026, 3:01 p.m.

8.7

CVSS4.0

CVE-2025-52980 - Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message

A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a BGP update is received over an established BGP session which contains…

📅 Published: July 11, 2025, 3:08 p.m. 🔄 Last Modified: Jan. 23, 2026, 7:37 p.m.
Total resulsts: 349182
Page 4672 of 34,919
« previous page » next page
Filters