Loading HuntDB...

Junos OS

526 Versions 572 CVEs

Versions

21.1R1

OTHER 14 CVEs

19.4R2-S4

OTHER 1 CVE

16.1R6-S6

OTHER 1 CVE

17.1R2-S9

OTHER 1 CVE

17.4 versions prior to 17.4R1-S6 and 17.4R2-S3 and 17.4R3

OTHER 1 CVE

15.1

MAJOR_MINOR 98 CVEs

22.2R3

OTHER 1 CVE

17.4R2-S7,17.4R3

OTHER 1 CVE

15.1R5

OTHER 1 CVE

17.4 versions prior to 17.4R1-S7 to 17.4R2-S2 and to 17.4R3

OTHER 1 CVE

13.3 prior to 13.3R9

OTHER 1 CVE

15.1X49 versions prior to 15.1X49-D170

OTHER 1 CVE

18.4R2-S5, 18.4R3-S1

OTHER 1 CVE

13.3 prior to 13.3R10

OTHER 1 CVE

20.4R3

OTHER 1 CVE

16.1X65

OTHER 10 CVEs

19.4R3-S3

OTHER 1 CVE

Junos releases prior to 10.2 are not affected

OTHER 1 CVE

17.2X75 versions prior to 17.2X75-D105

OTHER 1 CVE

12.1X47 prior to 12.1X47-D30, 12.1X47-D35

OTHER 1 CVE

18.4

MAJOR_MINOR 175 CVEs

18.3R3-S4

OTHER 5 CVEs

19.1R1-S3, 19.1R2

OTHER 1 CVE

21.3R3-S2

OTHER 1 CVE

16.1X70

OTHER 1 CVE

19.2R3-S6

OTHER 1 CVE

15.1 prior to 15.1F2-S14, 15.1F5-S7, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5-S1, 15.1R6

OTHER 1 CVE

14.1X53 prior to 14.1X53-D46, 14.1X53-D50

OTHER 1 CVE

18.2X75 versions prior to 18.2X75-D40

OTHER 1 CVE

17.1 versions prior to 17.1R3 on EX4300 Series

OTHER 1 CVE

19.3R3

OTHER 1 CVE

18.3R3-S2

OTHER 2 CVEs

18.2X75-D12, 18.2X75-D32, 18.2X75-D33, 18.2X75-D51, 18.2X75-D60, 18.2X75-D411, 18.2X75-D420

OTHER 1 CVE

18.2R1-S2, 18.2R1-S3, 18.2R2

OTHER 1 CVE

14.1 prior to 14.1R2-S8, 14.1R4-S12, 14.1R8

OTHER 1 CVE

18.3 versions prior to 18.3R1-S3 and 18.3R2

OTHER 1 CVE

12.3X48 prior to 12.3X48-D45

OTHER 2 CVEs

12.3X48 prior to 12.3X48-D51, 12.3X48-D55

OTHER 2 CVEs

16.2 versions prior to 16.2R2-S9

OTHER 2 CVEs

17.3 versions on SRX Series

OTHER 1 CVE

18.2R2-S1

OTHER 1 CVE

18.2 versions prior to 18.2R2

OTHER 2 CVEs

16.1 versions above and including 16.1R1 prior to 16.1R7-S5

OTHER 1 CVE

22.1

MAJOR_MINOR 139 CVEs

17.2R2-S4

OTHER 1 CVE

12.1X46-D25

OTHER 1 CVE

19.3

MAJOR_MINOR 180 CVEs

17.3R3

OTHER 2 CVEs

21.3

MAJOR_MINOR 138 CVEs

18.1R3

OTHER 1 CVE

19.1R3-S4, 19.1R3-S5

OTHER 1 CVE

18.1R3-S3, 18.1R3-S4, 18.1R3-S5, 18.1R3-S6, 18.1R3-S7, 18.1R3-S8

OTHER 1 CVE

13.2 prior to 13.2R8

OTHER 1 CVE

17.4R1-S6, 17.4R2-S2, 17.4R3

OTHER 1 CVE

17.2R1

OTHER 7 CVEs

14.1X53 prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40

OTHER 1 CVE

14.1X53 prior to 14.1X53-D40

OTHER 3 CVEs

17.3R2-S5, 17.3R3-S5

OTHER 1 CVE

15.1X53 prior to 15.1X53-D57

OTHER 1 CVE

17.2R1-S6

OTHER 1 CVE

17.2X75

OTHER 24 CVEs

18.3R3

OTHER 4 CVEs

17.3 versions prior to 17.3R3-S3 on EX4300 Series

OTHER 1 CVE

17.3R2-S2

OTHER 1 CVE

17.2X75-D101, 17.2X75-D110

OTHER 1 CVE

15.1F6-S10

OTHER 2 CVEs

20.4R3-S4

OTHER 1 CVE

12.1X46 prior to 12.1X46-D55

OTHER 2 CVEs

16.1R4-S9

OTHER 1 CVE

19.1R2-S2, 19.1R3

OTHER 1 CVE

16.1 versions prior to 16.1R3-S11 and 16.1R7-S4

OTHER 1 CVE

12.3 prior to 12.3R12-S4, 12.3R13, 12.3R3-S4

OTHER 1 CVE

16.1

MAJOR_MINOR 76 CVEs

20.4R2-S2, 20.4R3

OTHER 1 CVE

18.1R3-S11

OTHER 2 CVEs

14.2 prior to 14.2R6

OTHER 2 CVEs

13.3 prior to 13.3R10-S2

OTHER 3 CVEs

19.4R3-S9

OTHER 1 CVE

18.4 versions prior to 18.4R1-S2 and 18.4R2

OTHER 1 CVE

21.4R3

OTHER 3 CVEs

18.4R3-S5

OTHER 1 CVE

12.3 prior to 12.3R3-S4

OTHER 1 CVE

16.2 prior to 16.2R1-S5, 16.2R2

OTHER 1 CVE

13.3 prior to 13.3R10, 13.3R4-S11

OTHER 1 CVE

20.2R3-S6

OTHER 1 CVE

15.1 versions prior to 15.1F6-S12 and15.1R7-S4

OTHER 1 CVE

18.3R1-S6, 18.3R2-S3, 18.3R3

OTHER 1 CVE

17.3R3-S11

OTHER 1 CVE

19.3R1

OTHER 3 CVEs

16.1R from 16.1R2 prior to 16.1R3-S2, 16.1R4

OTHER 1 CVE

18.1R3-S5

OTHER 1 CVE

12.3X48 prior to 12.3X48-D35

OTHER 2 CVEs

14.1X53 versions prior to 14.1X53-D130 and 14.1X53-D49

OTHER 1 CVE

12.3X48-D95

OTHER 1 CVE

14.1 prior to 14.1R4-S9, 14.1R8

OTHER 1 CVE

17.2

MAJOR_MINOR 81 CVEs

14.1X53-D115

OTHER 1 CVE

20.2R2-S2

OTHER 1 CVE

14.1X53-D130

OTHER 1 CVE

17.3R1-S4

OTHER 1 CVE

13.3 prior to 13.3R7

OTHER 1 CVE

18.1R1

OTHER 2 CVEs

22.2

MAJOR_MINOR 139 CVEs

12.1X46 prior to 12.1X46-D71

OTHER 2 CVEs

18.2X75-D5

OTHER 2 CVEs

18.4R1-S4, 18.4R2

OTHER 1 CVE

18.3R1-S3

OTHER 1 CVE

12.3

MAJOR_MINOR 41 CVEs

21.1R3-S4

OTHER 1 CVE

21.1R3-S5

OTHER 1 CVE

12.3R12

OTHER 1 CVE

17.3R3-S8

OTHER 3 CVEs

17.4

MAJOR_MINOR 158 CVEs

13.2R1

OTHER 2 CVEs

17.4R2-S7, 17.4R3

OTHER 1 CVE

12.3R12-S19

OTHER 1 CVE

15.1 prior to 15.1R3

OTHER 3 CVEs

22.1R2

OTHER 2 CVEs

17.3R3-S12

OTHER 2 CVEs

17.3R2-S4

OTHER 1 CVE

15.1F6-S3

OTHER 1 CVE

18.2X75 versions prior to 18.2X75-D12 and 18.2X75-D30

OTHER 1 CVE

20.1R2

OTHER 1 CVE

14.1 prior to 14.1R8-S3, 14.1R9

OTHER 1 CVE

14.2 prior to 14.2R7-S7, 14.2R8

OTHER 1 CVE

21.3R2

OTHER 1 CVE

20.2R1

OTHER 4 CVEs

All

OTHER 1 CVE

16.2 16.2

OTHER 1 CVE

18.2X75-D53, 18.2X75-D65

OTHER 1 CVE

12.3 prior to 12.3R12

OTHER 1 CVE

14.1X55 from 14.1X55-D30 prior to 14.1X55-D35

OTHER 1 CVE

18.1R3-S9

OTHER 2 CVEs

18.2R3, 18.2R3-S1, 18.2R3-S2

OTHER 1 CVE

18.4R2-S4

OTHER 1 CVE

20.1R3-S1

OTHER 1 CVE

15.1 prior to 15.1F2-S16, 15.1F5-S7, 15.1F6-S6, 15.1R5-S2, 15.1R6

OTHER 1 CVE

17.3R2-S5, 17.3R3-S6

OTHER 1 CVE

14.1 prior to 14.1R8-S5, 14.1R9

OTHER 2 CVEs

18.2R3

OTHER 5 CVEs

17.4R2-S10, 17.4R3-S2

OTHER 1 CVE

17.4R2-S11, 17.4R3-S2

OTHER 1 CVE

15.1X49 prior to 15.1X49-D110

OTHER 1 CVE

21.1R2

OTHER 1 CVE

17.1

MAJOR_MINOR 71 CVEs

21.1R3

OTHER 1 CVE

21.2

MAJOR_MINOR 168 CVEs

12.3X48-D75

OTHER 1 CVE

13.2X51 prior to 13.2X51-D40

OTHER 1 CVE

19.1R2-S2, 19.1R3-S1

OTHER 1 CVE

18.4R3-S6

OTHER 1 CVE

23.1

MAJOR_MINOR 4 CVEs

18.2R3-S2

OTHER 1 CVE

18.1X75-D10

OTHER 1 CVE

21.2R3-S8

OTHER 1 CVE

22.3R2

OTHER 2 CVEs

15.1F1

OTHER 1 CVE

21.2R1-S2, 21.2R2-S1

OTHER 1 CVE

12.3X48 prior to 12.3X48-D55

OTHER 2 CVEs

14.2 prior to 14.2R4-S9, 14.2R7-S8, 14.2R8

OTHER 1 CVE

15.1X53-D59

OTHER 1 CVE

18.4R3

OTHER 2 CVEs

12.3R1

OTHER 1 CVE

16.1R4-S12

OTHER 1 CVE

20.3R3

OTHER 1 CVE

15.1X53 prior to 15.1X53-D47, 15.1X53-D62, 15.1X53-D70, 15.1X53-D105

OTHER 1 CVE

17.2R3-S3

OTHER 2 CVEs

17.1R1

OTHER 4 CVEs

14.2 from 14.2R3 prior to 14.2R7-S8, 14.2R8

OTHER 1 CVE

19.3R2-S6, 19.3R3-S3

OTHER 1 CVE

18.3 versions prior to 18.3R1-S2 and to 18.3R2 on SRX Series

OTHER 1 CVE

19.2R2

OTHER 6 CVEs

17.4R1

OTHER 5 CVEs

14.1 prior to 14.1R4-S12, 14.1R5, 14.1R6

OTHER 1 CVE

15.1X49 prior to 15.1X49-D20, 15.1X49-D30

OTHER 1 CVE

17.4R2-S4

OTHER 1 CVE

12.3X48 prior to 12.3X48-D50, 12.3X48-D55

OTHER 1 CVE

20.3R1

OTHER 9 CVEs

14.2 prior to 14.2R4-S7, 14.2R6-S4, 14.2R7

OTHER 1 CVE

16.1R3-S8

OTHER 1 CVE

14.1X53

OTHER 44 CVEs

17.2 prior to 17.2R1-S1, 17.2R2

OTHER 2 CVEs

22.4R3

OTHER 1 CVE

17.2X75-D100

OTHER 1 CVE

20.1R1

OTHER 16 CVEs

15.1X49-D131

OTHER 1 CVE

20.4R2-S1, 20.4R3

OTHER 1 CVE

16.1R6

OTHER 1 CVE

17.1R3

OTHER 1 CVE

12.1X46 prior to 12.1X46-D50

OTHER 1 CVE

19.4R2

OTHER 1 CVE

any

OTHER 2 CVEs

19.4R2-S7, 19.4R3-S5

OTHER 1 CVE

16.1 versions prior to 16.1R7-S3

OTHER 1 CVE

15.1R6-S6

OTHER 1 CVE

18.3R3-S5

OTHER 1 CVE

20.1

MAJOR_MINOR 144 CVEs

13.3 prior to 13.3R8

OTHER 1 CVE

0

SINGLE_NUMBER 105 CVEs

12.1X46 prior to 12.1X46-D65

OTHER 1 CVE

15.1X49 versions prior to 15.1X49-D181 and 15.1X49-D190 on SRX Series

OTHER 1 CVE

16.1X65 prior to 16.1X65-D45

OTHER 1 CVE

15.1X53 prior to 15.1X53-D231, 15.1X53-D47, 15.1X53-D48, 15.1X53-D57, 15.1X53-D64, 15.1X53-D70

OTHER 2 CVEs

15.1X53 prior to 15.1X53-D47, 15.1X53-D232

OTHER 1 CVE

17.2 prior to 17.2R1-S2, 17.2R2

OTHER 1 CVE

17.2R2-S7

OTHER 1 CVE

15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6

OTHER 1 CVE

18.2R3-S3

OTHER 1 CVE

18.1R3-S10

OTHER 4 CVEs

19.1R3-S1

OTHER 1 CVE

17.4R2-S7

OTHER 1 CVE

15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7

OTHER 1 CVE

19.1R1

OTHER 5 CVEs

13.2X51 prior to 13.2X51-D39, 13.2X51-D40

OTHER 1 CVE

17.4R2-S13

OTHER 1 CVE

18.1R2

OTHER 2 CVEs

19.1R1-S5, 19.1R2-S2, 19.1R3-S2

OTHER 1 CVE

18.4R2-S10

OTHER 1 CVE

22.3

MAJOR_MINOR 119 CVEs

18.3R1

OTHER 4 CVEs

12.1X46-D81

OTHER 1 CVE

15.1 prior to 15.1F2-S18, 15.1R4

OTHER 1 CVE

20.3R1-S2

OTHER 1 CVE

12.1X46 prior to 12.1X46-D40

OTHER 1 CVE

23.4

MAJOR_MINOR 26 CVEs

15.1F6

OTHER 8 CVEs

18.1 versions prior to 18.1R3-S2

OTHER 1 CVE

17.3 versions prior to 17.3R3-S4

OTHER 1 CVE

14.1 prior to 14.1R4-S12, 14.1R7

OTHER 1 CVE

12.3X48

OTHER 55 CVEs

15.1X49 prior to 15.1X49-D80

OTHER 2 CVEs

18.2X75

OTHER 44 CVEs

22.2R2

OTHER 4 CVEs

12.1X46-D76

OTHER 1 CVE

16.2R2-S7

OTHER 1 CVE

18.4R2-S5, 18.4R3-S6

OTHER 1 CVE

14.1 prior to 14.1R2-S10, 14.1R8-S4, 14.1R9

OTHER 2 CVEs

12.3X48 prior to 12.3X48-D20, 12.3X48-D30

OTHER 1 CVE

15.1 prior to 15.1F2-S11, 15.1F4-S1-J1, 15.1F5-S3, 15.1F6, 15.1R4

OTHER 1 CVE

18.2X75-D20

OTHER 1 CVE

21.4R3-S4

OTHER 1 CVE

18.4R1-S5, 18.4R2-S4, 18.4R3

OTHER 1 CVE

Any

OTHER 1 CVE

16.2 prior to 16.2R2-S1, 16.2R3

OTHER 1 CVE

15.1X54

OTHER 1 CVE

19.2R3-S3

OTHER 2 CVEs

14.1X53 prior to 14.1X53-D50

OTHER 2 CVEs

15.1F5-S7

OTHER 1 CVE

18.2R3-S4

OTHER 2 CVEs

18.2R1

OTHER 4 CVEs

22.2R3-S4

OTHER 1 CVE

24.2

MAJOR_MINOR 5 CVEs

15.1X49

OTHER 85 CVEs

18.2X75-D50, 18.2X75-D60

OTHER 1 CVE

20.2

MAJOR_MINOR 165 CVEs

14.1X53 prior to 14.1X53-D122, 14.1X53-D45, 14.1X53-D50

OTHER 1 CVE

20.3

MAJOR_MINOR 146 CVEs

15.1 prior to 15.1F5, 15.1R3

OTHER 1 CVE

18.4 versions prior to 18.4R1-S1 and to 18.4R2 on SRX Series

OTHER 1 CVE

15.1X49 prior to 15.1X49-D75

OTHER 1 CVE

18.3

MAJOR_MINOR 161 CVEs

21.2R3-S5

OTHER 2 CVEs

18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70

OTHER 1 CVE

18.4R3-S9

OTHER 2 CVEs

22.3R3

OTHER 1 CVE

18.1R2-S3, 18.1R3

OTHER 2 CVEs

14.1X53 prior to 14.1X53-D28, 14.1X53-D40

OTHER 2 CVEs

18.3R2

OTHER 2 CVEs

20.2R2

OTHER 2 CVEs

17.3R1-S1, 17.3R2

OTHER 1 CVE

21.2R1-S1, 21.2R2

OTHER 1 CVE

19.2R3-S1

OTHER 2 CVEs

12.3 Any

OTHER 1 CVE

17.3R3-S4, 17.3R3-S5

OTHER 1 CVE

18.4R2-S5, 18.4R3-S2

OTHER 1 CVE

18.4R1-S8, 18.4R2-S7

OTHER 1 CVE

18.4R3-S7

OTHER 2 CVEs

17.2 versions prior to 17.2R3

OTHER 2 CVEs

17.3R2-S4, 17.3R3-S2

OTHER 1 CVE

15.1 prior to 15.1F2-S18, 15.1F6-S7, 15.1R4-S8, 15.1R5-S5, 15.1R6-S1, 15.1R7

OTHER 2 CVEs

14.1R1

OTHER 1 CVE

12.1X47 prior to 12.1X47-D45

OTHER 1 CVE

17.4R3-S3

OTHER 1 CVE

17.4 versions prior to 17.4R2-S5 and 17.4R3 on EX4300 Series

OTHER 1 CVE

12.3R

OTHER 1 CVE

20.4R1

OTHER 3 CVEs

12.1X46 prior to 12.1X46-D45

OTHER 2 CVEs

23.2

MAJOR_MINOR 62 CVEs

15.1X53 versions prior to 15.1X53-D237 and 15.1X53-D496 and 15.1X53-D591 and 15.1X53-D69

OTHER 1 CVE

17.1 versions prior to 17.1R3

OTHER 3 CVEs

14.1X53 versions prior to 14.1X53-D51 and 14.1X53-D115 on EX4300 Series

OTHER 1 CVE

13.3 prior to 13.3R4-S11, 13.3R10

OTHER 1 CVE

11.4 prior to 11.4R13-S3

OTHER 3 CVEs

15.1X49 prior to 15.1X49-D90

OTHER 1 CVE

15.1X53 prior to 15.1X53-D64, 15.1X53-D70

OTHER 1 CVE

15.1 prior to 15.1F2, 15.1F3, 15.1R2

OTHER 1 CVE

16.2R1

OTHER 2 CVEs

12.3X48-D66

OTHER 1 CVE

15.1X49 prior to 15.1X49-D100

OTHER 7 CVEs

19.4R3-S10

OTHER 1 CVE

19.4R3-S2

OTHER 1 CVE

20.4R3-S5

OTHER 1 CVE

17.4R3

OTHER 5 CVEs

19.4R1-S4, 19.4R3-S2

OTHER 1 CVE

14.1 prior to 14.1R8-S4, 14.1R9

OTHER 2 CVEs

18.1

MAJOR_MINOR 153 CVEs

19.4R2-S3, 19.4R3

OTHER 1 CVE

19.3R2-S7, 19.3R3-S3

OTHER 1 CVE

15.1X49 prior to 15.1X49-D70

OTHER 1 CVE

17.1R2-S7

OTHER 1 CVE

20.4

MAJOR_MINOR 149 CVEs

18.3R2-S4, 18.3R3-S2

OTHER 2 CVEs

17.1 prior to 17.1R2-S2, 17.1R3

OTHER 1 CVE

17.2R2-S6, 17.2R3

OTHER 1 CVE

14.1X53 prior to 14.1X53-D45, 14.1X53-D50

OTHER 1 CVE

14.2 prior to 14.2R4

OTHER 1 CVE

19.2R1-S6

OTHER 1 CVE

14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9

OTHER 1 CVE

19.3R3-S2

OTHER 2 CVEs

14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8

OTHER 1 CVE

22.3R3-S2

OTHER 1 CVE

14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R6

OTHER 1 CVE

15.1X49 prior to 15.1X49-D40

OTHER 2 CVEs

17.2 versions prior to 17.2R3-S2 on EX4300 Series

OTHER 1 CVE

12.3X48 from 12.3X48-D30 and prior to 12.3X48-D35

OTHER 1 CVE

14.1X55 prior to 14.1X55-D35

OTHER 3 CVEs

12.3X48 prior to 12.3X48-D30

OTHER 3 CVEs

16.1 prior to 16.1R2

OTHER 3 CVEs

15.1X53 prior to 15.1X53-D47

OTHER 3 CVEs

18.4R1

OTHER 2 CVEs

18.1R3-S7

OTHER 2 CVEs

20.3R3-S6

OTHER 1 CVE

16.1R7

OTHER 2 CVEs

19.1R3-S7

OTHER 2 CVEs

15.1R7-S2

OTHER 1 CVE

15.1X53-D233

OTHER 1 CVE

17.2X75 prior to 17.2X75-D30

OTHER 2 CVEs

15.1R from 15.1R5 prior to 15.1R5-S2, 15.1R6

OTHER 1 CVE

16.2

MAJOR_MINOR 56 CVEs

15.1F7

OTHER 1 CVE

14.1X53-D47

OTHER 1 CVE

18.2X75-D50.8 18.2X75-D60

OTHER 1 CVE

17.2R3-S4

OTHER 1 CVE

12.3X48 prior to 12.3X48-D20

OTHER 2 CVEs

14.2

MAJOR_MINOR 8 CVEs

16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5

OTHER 1 CVE

20.3R3-S2

OTHER 1 CVE

15.1X49 from 15.1X49-D40 and prior to 15.1X49-D50

OTHER 1 CVE

17.3

MAJOR_MINOR 137 CVEs

20.3R3-S1

OTHER 1 CVE

17.3R3-S6

OTHER 1 CVE

16.1 prior to 16.1R3-S3, 16.1R4

OTHER 1 CVE

14.1X53 prior to 14.1X53-D122, 14.1X53-D44, 14.1X53-D50

OTHER 1 CVE

19.4R1-S2, 19.4R2

OTHER 1 CVE

21.3R1

OTHER 2 CVEs

19.4

MAJOR_MINOR 178 CVEs

16.1R7-S8

OTHER 2 CVEs

all versions prior to 15.1R2

OTHER 1 CVE

15.1X8

OTHER 1 CVE

20.2R3-S5

OTHER 1 CVE

21.4R1

OTHER 1 CVE

18.1R3-S4

OTHER 1 CVE

17.2R1-S3, 17.2R3

OTHER 1 CVE

23.4R1

OTHER 1 CVE

15.1X53 prior to 15.1X53-D33, 15.1X53-D50

OTHER 1 CVE

15.1X53-D67

OTHER 1 CVE

17.3R3-S3

OTHER 2 CVEs

18.2R2-S8, 18.2R3-S7

OTHER 1 CVE

19.4R3

OTHER 1 CVE

24.2R1

OTHER 1 CVE

19.1R3

OTHER 1 CVE

12.3X48 prior to 12.3X48-D32, 12.3X48-D35

OTHER 1 CVE

17.2R2-S6

OTHER 1 CVE

17.4R3-S5

OTHER 1 CVE

16.1R7-S6

OTHER 1 CVE

21.2R1

OTHER 3 CVEs

12.1X44 prior to 12.1X44-D60

OTHER 2 CVEs

22.1R3

OTHER 4 CVEs

18.4R2

OTHER 7 CVEs

18.2

MAJOR_MINOR 146 CVEs

17.4 versions prior to 17.4R1-S8 and to 17.4R2-S5 and to 17.4R3 on SRX Series

OTHER 1 CVE

17.2 versions prior to 17.2R1-S8 and 17.2R2-S7 and 17.2R3-S1

OTHER 1 CVE

22.4

MAJOR_MINOR 100 CVEs

18.1 versions prior to 18.1R2-S4 and 18.1R3-S3

OTHER 1 CVE

14.1

MAJOR_MINOR 9 CVEs

15.1X53-D471

OTHER 1 CVE

19.2R3

OTHER 1 CVE

19.4R3-S4

OTHER 1 CVE

19.4R1

OTHER 3 CVEs

17.1R1-S7

OTHER 1 CVE

19.2R1-S2, 19.2R2

OTHER 1 CVE

20.4R3-S1

OTHER 1 CVE

12.1X46 prior to 12.1X46-D60

OTHER 1 CVE

14.1 prior to 14.1R8

OTHER 1 CVE

15.1X49 prior to 15.1X49-D20

OTHER 2 CVEs

17.4R1-S5

OTHER 1 CVE

12.1X46

OTHER 28 CVEs

15.1F

OTHER 4 CVEs

17.4 versions prior to 17.4R2

OTHER 1 CVE

16.2R2-S5

OTHER 1 CVE

17.1 prior to 17.1R1-S3, 17.1R2

OTHER 3 CVEs

15.1 prior to 15.1R5

OTHER 1 CVE

16.1X70-D10

OTHER 1 CVE

18.4R1-S7, 18.4R3-S3

OTHER 1 CVE

14.2 prior to 14.2R7-S9, 14.2R8

OTHER 2 CVEs

15.1X49-D150

OTHER 1 CVE

18.2 versions prior to 18.2R1-S5 and 18.2R2-S2 and 18.2R3

OTHER 1 CVE

22.4R1

OTHER 3 CVEs

23.2R2

OTHER 1 CVE

20.3R2

OTHER 1 CVE

18.2 versions prior to 18.2R2-S1 and to 18.2R3 on SRX Series

OTHER 1 CVE

13.2 prior to 13.2R9

OTHER 1 CVE

13.3 prior to 13.3R4-S11, 13.3R9

OTHER 1 CVE

18.2X75-D32, 18.2X75-D33, 18.2X75-D420, 18.2X75-D52, 18.2X75-D60, 18.2X75-D65, 18.2X75-D70

OTHER 1 CVE

18.2X75-D12, 18.2X75-D33, 18.2X75-D420, 18.2X75-D60,18.2X75-D411

OTHER 1 CVE

14.2 prior to 14.2R4-S9, 14.2R7-S7, 14.2R8

OTHER 2 CVEs

21.2R3

OTHER 2 CVEs

19.3R2

OTHER 1 CVE

15.1 prior to 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3

OTHER 1 CVE

12.3X48 versions prior to 12.3X48-D85 on SRX Series

OTHER 1 CVE

17.3 prior to 17.3R1-S1, 17.3R2

OTHER 1 CVE

19.2R1-S5, 19.2R2, 19.2R3

OTHER 1 CVE

15.1R6-S6, 15.1R7

OTHER 1 CVE

16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R4-S4, 16.1R5

OTHER 2 CVEs

14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R5

OTHER 1 CVE

18.3 versions prior to 18.3R2 on EX4300 Series

OTHER 1 CVE

14.1X53 prior to 14.1X53-D42, 14.1X53-D50

OTHER 1 CVE

12.3X48 versions prior to 12.3X48-D80

OTHER 1 CVE

19.2R1-S5, 19.2R2

OTHER 2 CVEs

15.1R7

OTHER 1 CVE

12.1X46-D71, 12.1X46-D73

OTHER 1 CVE

15.1R1

OTHER 1 CVE

19.1R2

OTHER 4 CVEs

12.1X46 prior to 12.3X46-D71

OTHER 1 CVE

14.2R from 14.2R7 prior to 14.2R7-S4, 14.2R8

OTHER 1 CVE

16.1R1

OTHER 7 CVEs

19.2

MAJOR_MINOR 187 CVEs

15.1X53-D590

OTHER 1 CVE

18.4R3-S8

OTHER 1 CVE

17.3R1

OTHER 6 CVEs

14.1X53 prior to 14.1X53-D30

OTHER 2 CVEs

17.4R2-S4, 17.4R3

OTHER 1 CVE

16.1R7-S2

OTHER 1 CVE

17.4R2

OTHER 2 CVEs

18.4R2-S5

OTHER 1 CVE

18.4R3-S1

OTHER 1 CVE

14.1 prior to 14.1R6

OTHER 2 CVEs

16.2 prior to 16.2R1-S3, 16.2R2

OTHER 1 CVE

17.2R3-S1

OTHER 1 CVE

20.2R3-S2

OTHER 2 CVEs

14.1X50

OTHER 1 CVE

15.1X53-D235

OTHER 1 CVE

16.1R5-S4

OTHER 1 CVE

15.1 prior to 15.1F4, 15.1R3

OTHER 1 CVE

16.1R6-S6, 16.1R7-S3

OTHER 1 CVE

12.3R12-S10

OTHER 1 CVE

12.1X44 prior to 12.1X44-D55

OTHER 1 CVE

15.1 prior to 15.1F5-S3, 15.1F6, 15.1R4

OTHER 1 CVE

5.6R1

OTHER 1 CVE

17.3R3-S9

OTHER 1 CVE

18.1R3-S6

OTHER 3 CVEs

22.3R1

OTHER 2 CVEs

16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6

OTHER 1 CVE

21.4R2

OTHER 2 CVEs

12.3 versions prior to 12.3R12-S13

OTHER 1 CVE

17.2R2

OTHER 4 CVEs

15.1R7-S10

OTHER 1 CVE

23.2R1

OTHER 1 CVE

16.2 prior to 16.2R2

OTHER 2 CVEs

18.1 versions prior to 18.1R3

OTHER 1 CVE

14.2 prior to 14.2R5

OTHER 1 CVE

15.1R4-S9

OTHER 1 CVE

16.2R1-S6

OTHER 1 CVE

all

OTHER 7 CVEs

18.2X75-D420, 18.2X75-D50

OTHER 1 CVE

17.2 prior to 17.2R1-S3, 17.2R2

OTHER 1 CVE

18.1 versions prior to 18.1R3-S1 on EX4300 Series

OTHER 1 CVE

12.1X46 prior to 12.1X46-D67

OTHER 3 CVEs

16.1R6-S3

OTHER 1 CVE

14.1 from 14.1R5 prior to 14.1R8-S4, 14.1R9

OTHER 1 CVE

15.1X49 prior to 15.1X49-D91, 15.1X49-D100

OTHER 1 CVE

19.1

MAJOR_MINOR 171 CVEs

15.1R4, 15.1R5, 15.1R6

OTHER 1 CVE

12.3 prior to 12.3R10, 12.3R11

OTHER 1 CVE

15.1X53

OTHER 60 CVEs

18.2R1-S1, 18.2R2

OTHER 1 CVE

18.3 versions prior to 18.3R1-S4 and 18.3R2

OTHER 1 CVE

20.1R3-S5

OTHER 1 CVE

12.3X48 prior to 12.3X48-D50

OTHER 3 CVEs

19.1R3-S3

OTHER 3 CVEs

15.1X49 prior to TPM firmware version 4.43

OTHER 1 CVE

18.1 versions prior to 18.1R3-S6 on SRX Series

OTHER 1 CVE

17.4R1-S3

OTHER 1 CVE

20.1R2-S1

OTHER 1 CVE

19.2R1

OTHER 5 CVEs

17.2X75 prior to 17.2X75-D50

OTHER 2 CVEs

20.2R3

OTHER 1 CVE

21.4

MAJOR_MINOR 165 CVEs

21.2R3-S3

OTHER 2 CVEs

18.2X75-D430, 18.2X75-D53, 18.2X75-D60

OTHER 1 CVE

18.2R3-S6

OTHER 3 CVEs

18.2 versions prior to 18.2R2 on EX4300 Series

OTHER 1 CVE

14.1X50 prior to 14.1X50-D185

OTHER 3 CVEs

unspecified

OTHER 184 CVEs

12.1X47 prior to 12.1X47-D30

OTHER 2 CVEs

21.4R3-S7

OTHER 1 CVE

18.1R3-S13

OTHER 1 CVE

19.3R3-S7

OTHER 1 CVE

16.1 prior to 16.1R4-S1, 16.1R5

OTHER 1 CVE

23,2

OTHER 1 CVE

12.3 prior to 12.3R11

OTHER 2 CVEs

15.1X53 prior to 15.1X53-D51, 15.1X53-D60

OTHER 1 CVE

22.1R1

OTHER 1 CVE

21.2R3-S2

OTHER 2 CVEs

15.1X53 prior to 15.1X53-D57, 15.1X53-D70

OTHER 2 CVEs

18.2R2-S6, 18.2R3-S2

OTHER 1 CVE

21.1

MAJOR_MINOR 147 CVEs

18.1R3-S12

OTHER 1 CVE

17.4R3-S2

OTHER 1 CVE

15.1 prior to 15.1F5

OTHER 1 CVE

18.1X75 all versions

OTHER 1 CVE

12.3X48-D80

OTHER 1 CVE

20.2R1-S3, 20.2R2

OTHER 1 CVE

18.2R2-S7, 18.2R3-S5

OTHER 1 CVE

17.3 versions prior to 17.3R3-S2

OTHER 2 CVEs

15.1X49 prior to 15.1X49-D60

OTHER 3 CVEs

Recent CVEs

CVE-2025-21598

An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd. This issue affects: Junos OS:  * from 21.2R3-S8 before 21.2R3-S9,  * from 21.4R3-S7 before 21.4R3-S9,  * from 22.2R3-S4 before 22.2R3-S5,  * from 22.3R3-S2 before 22.3R3-S4,  * from 22.4R3 before 22.4R3-S5,  * from 23.2R2 before 23.2R2-S2,  * from 23.4R1 before 23.4R2-S1,  * from 24.2R1 before 24.2R1-S1, 24.2R2. Junos OS Evolved: * from 21.4R3-S7-EVO before 21.4R3-S9-EVO,  * from 22.2R3-S4-EVO before 22.2R3-S5-EVO,  * from 22.3R3-S2-EVO before 22.3R3-S4-EVO,  * from 22.4R3-EVO before 22.4R3-S5-EVO,  * from 23.2R2-EVO before 23.2R2-S2-EVO,  * from 23.4R1-EVO before 23.4R2-S1-EVO,  * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue requires a BGP session to be established. This issue can propagate and multiply through multiple ASes until reaching vulnerable devices. This issue affects iBGP and eBGP. This issue affects IPv4 and IPv6. An indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue: For example, by issuing the command on the neighboring device:  show log messages Reviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:   rpd[<pid>]: Received malformed update from <IP address> (External AS <AS#>) and   rpd[<pid>]: Malformed Attribute

HIGH Jan 09, 2025

CVE-2024-39550

A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps) to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). Memory can only be recovered by manually restarting rtlogd process.  The memory usage can be monitored using the below command.     user@host> show system processes extensive | match rtlog  This issue affects Junos OS on MX Series with SPC3 line card:  * from 21.2R3 before 21.2R3-S8,  * from 21.4R2 before 21.4R3-S6,  * from 22.1 before 22.1R3-S5,  * from 22.2 before 22.2R3-S3,  * from 22.3 before 22.3R3-S2,  * from 22.4 before 22.4R3-S1,  * from 23.2 before 23.2R2,  * from 23.4 before 23.4R2.

MEDIUM Jul 11, 2024

CVE-2024-39541

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart. This issue affects: Junos OS: * 22.4 versions before 22.4R3-S1, * 23.2 versions before 23.2R2,  * 23.4 versions before 23.4R1-S1, 23.4R2,  This issue does not affect Junos OS versions earlier than 22.4R1. Junos OS Evolved: * 22.4-EVO versions before 22.4R3-S2-EVO, * 23.2-EVO versions before 23.2R2-EVO, * 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO, This issue does not affect Junos OS Evolved versions earlier than before 22.4R1.

MEDIUM Jul 11, 2024

CVE-2024-39533

An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions ip-source-address ip-destination-address arp-type which are not supported for this type of filter, are used in an ethernet switching filter, and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect. This issue affects Junos OS on QFX5000 Series and EX4600 Series: * All version before 21.2R3-S7,  * 21.4 versions before 21.4R3-S6, * 22.1 versions before 22.1R3-S5, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S2,  * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. Please note that the implemented fix ensures these unsupported match conditions cannot be committed anymore.

MEDIUM Jul 11, 2024

CVE-2024-39561

An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an attacker to send TCP packets with SYN/FIN or SYN/RST flags, bypassing the expected blocking of these packets. A TCP packet with SYN/FIN or SYN/RST should be dropped in flowd. However, when no-syn-check and Express Path are enabled, these TCP packets are unexpectedly transferred to the downstream network. This issue affects Junos OS on SRX4600 and SRX5000 Series: * All versions before 21.2R3-S8, * from 21.4 before 21.4R3-S7, * from 22.1 before 22.1R3-S6, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2, * from 23.4 before 23.4R1-S1, 23.4R2.

MEDIUM Jul 10, 2024

CVE-2024-30388

An Improper Isolation or Compartmentalization vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series and EX Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If a specific malformed LACP packet is received by a QFX5000 Series, or an EX4400, EX4100 or EX4650 Series device, an LACP flap will occur resulting in traffic loss. This issue affects Junos OS on QFX5000 Series, and on EX4400, EX4100 or EX4650 Series: * 20.4 versions from 20.4R3-S4 before 20.4R3-S8, * 21.2 versions from 21.2R3-S2 before 21.2R3-S6, * 21.4 versions from 21.4R2 before 21.4R3-S4, * 22.1 versions from 22.1R2 before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R2-S2, 22.3R3, * 22.4 versions before 22.4R2-S1, 22.4R3.

MEDIUM Apr 12, 2024

CVE-2024-21620

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2.

HIGH Jan 25, 2024

CVE-2024-21585

An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing protocol daemon (rpd) process to crash and restart, leading to a Denial of Service (DoS) condition. Continued BGP session flapping will create a sustained Denial of Service (DoS) condition. This issue only affects routers configured with non-stop routing (NSR) enabled. Graceful Restart (GR) helper mode, enabled by default, is also required for this issue to be exploitable. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. When the BGP session flaps on the NSR-enabled router, the device enters GR-helper/LLGR-helper mode due to the peer having negotiated GR/LLGR-restarter capability and the backup BGP requests for replication of the GR/LLGR-helper session, master BGP schedules, and initiates replication of GR/LLGR stale routes to the backup BGP. In this state, if the BGP session with the BGP peer comes up again, unsolicited replication is initiated for the peer without cleaning up the ongoing GR/LLGR-helper mode replication. This parallel two instances of replication for the same peer leads to the assert if the BGP session flaps again. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. Juniper Networks Junos OS Evolved * All versions earlier than 21.3R3-S5-EVO; * 21.4 versions earlier than 21.4R3-S5-EVO; * 22.1 versions earlier than 22.1R3-S4-EVO; * 22.2 versions earlier than 22.2R3-S3-EVO; * 22.3 versions earlier than 22.3R3-S1-EVO; * 22.4 versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO; * 23.2 versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO.

MEDIUM Jan 12, 2024

CVE-2023-36841

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS). An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover. This issue affects interfaces with PPPoE configured and tcp-mss enabled. This issue affects Juniper Networks Junos OS * All versions prior to 20.4R3-S7; * 21.1 version 21.1R1 and later versions; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3; * 22.3 versions prior to 22.3R2-S2; * 22.4 versions prior to 22.4R2;

HIGH Oct 12, 2023

CVE-2023-36845

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

CRITICAL Aug 17, 2023