7.1
CVE-2024-39543 - Junos OS and Junos OS Evolved: Receipt of a large RPKI-RTR PDU packet can cause rpd to crash
A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash, creating a Denial of Service (DoS) …
8.7
CVE-2024-39542 - Junos OS and Junos OS Evolved: A malformed CFM packet or specific transit traffic leads to FPC crash
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denia…
7.1
CVE-2024-39541 - Junos OS and Junos OS Evolved: Inconsistent information in the TE database can lead to an rpd crash
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting information (IP or ISO addresses) about a node is ad…
8.7
CVE-2024-39540 - Junos OS: SRX Series, and MX Series with SPC3: Specific valid TCP traffic can cause a pfe crash
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives spe…
6
CVE-2024-39539 - Junos OS: MX Series: Continuous subscriber logins will lead to a memory leak and eventually an FPC …
A Missing Release of Memory after Effective Lifetime vulnerability in Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). In a subscriber management scenario continuous subscriber logins will trigger a memory leak and eventually le…
7.1
CVE-2024-39538 - Junos OS Evolved: ACX7000 Series: When multicast traffic with a specific (S,G) is received evo-pfem…
A Buffer Copy without Checking Size of Input vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).When multicast traffic with a specific, valid (S,G) is recei…
6.9
CVE-2024-39537 - Junos OS Evolved: ACX7000 Series: Ports which have been inadvertently exposed can be reached over t…
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network-based attacker to cause a limited information disclosure and availability impact to the device. Due to a wrong initializ…
6
CVE-2024-39536 - Junos OS and Junos OS Evolved: Flaps of BFD sessions with authentication cause a ppmd memory leak
A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). When a BFD session configured with authentication …
7.1
CVE-2024-39535 - Junos OS Evolved: ACX 7000 Series: When specific traffic is received in a VPLS scenario evo-pfemand…
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When a device has a Layer 3 or an IRB interface confi…
6.9
CVE-2024-39533 - Junos OS: QFX5000 Series and EX4600 Series: Output firewall filter is not applied if certain match …
An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions ip-source-add…