Versions
21.1R1
19.4R2-S4
16.1R6-S6
17.1R2-S9
17.4 versions prior to 17.4R1-S6 and 17.4R2-S3 and 17.4R3
15.1
22.2R3
17.4R2-S7,17.4R3
15.1R5
17.4 versions prior to 17.4R1-S7 to 17.4R2-S2 and to 17.4R3
13.3 prior to 13.3R9
15.1X49 versions prior to 15.1X49-D170
18.4R2-S5, 18.4R3-S1
13.3 prior to 13.3R10
20.4R3
16.1X65
19.4R3-S3
Junos releases prior to 10.2 are not affected
17.2X75 versions prior to 17.2X75-D105
12.1X47 prior to 12.1X47-D30, 12.1X47-D35
18.4
18.3R3-S4
19.1R1-S3, 19.1R2
21.3R3-S2
16.1X70
19.2R3-S6
15.1 prior to 15.1F2-S14, 15.1F5-S7, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5-S1, 15.1R6
14.1X53 prior to 14.1X53-D46, 14.1X53-D50
18.2X75 versions prior to 18.2X75-D40
17.1 versions prior to 17.1R3 on EX4300 Series
19.3R3
18.3R3-S2
18.2X75-D12, 18.2X75-D32, 18.2X75-D33, 18.2X75-D51, 18.2X75-D60, 18.2X75-D411, 18.2X75-D420
18.2R1-S2, 18.2R1-S3, 18.2R2
14.1 prior to 14.1R2-S8, 14.1R4-S12, 14.1R8
18.3 versions prior to 18.3R1-S3 and 18.3R2
12.3X48 prior to 12.3X48-D45
12.3X48 prior to 12.3X48-D51, 12.3X48-D55
16.2 versions prior to 16.2R2-S9
17.3 versions on SRX Series
18.2R2-S1
18.2 versions prior to 18.2R2
16.1 versions above and including 16.1R1 prior to 16.1R7-S5
22.1
17.2R2-S4
12.1X46-D25
19.3
17.3R3
21.3
18.1R3
19.1R3-S4, 19.1R3-S5
18.1R3-S3, 18.1R3-S4, 18.1R3-S5, 18.1R3-S6, 18.1R3-S7, 18.1R3-S8
13.2 prior to 13.2R8
17.4R1-S6, 17.4R2-S2, 17.4R3
17.2R1
14.1X53 prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40
14.1X53 prior to 14.1X53-D40
17.3R2-S5, 17.3R3-S5
15.1X53 prior to 15.1X53-D57
17.2R1-S6
17.2X75
18.3R3
17.3 versions prior to 17.3R3-S3 on EX4300 Series
17.3R2-S2
17.2X75-D101, 17.2X75-D110
15.1F6-S10
20.4R3-S4
12.1X46 prior to 12.1X46-D55
16.1R4-S9
19.1R2-S2, 19.1R3
16.1 versions prior to 16.1R3-S11 and 16.1R7-S4
12.3 prior to 12.3R12-S4, 12.3R13, 12.3R3-S4
16.1
20.4R2-S2, 20.4R3
18.1R3-S11
14.2 prior to 14.2R6
13.3 prior to 13.3R10-S2
19.4R3-S9
18.4 versions prior to 18.4R1-S2 and 18.4R2
21.4R3
18.4R3-S5
12.3 prior to 12.3R3-S4
16.2 prior to 16.2R1-S5, 16.2R2
13.3 prior to 13.3R10, 13.3R4-S11
20.2R3-S6
15.1 versions prior to 15.1F6-S12 and15.1R7-S4
18.3R1-S6, 18.3R2-S3, 18.3R3
17.3R3-S11
19.3R1
16.1R from 16.1R2 prior to 16.1R3-S2, 16.1R4
18.1R3-S5
12.3X48 prior to 12.3X48-D35
14.1X53 versions prior to 14.1X53-D130 and 14.1X53-D49
12.3X48-D95
14.1 prior to 14.1R4-S9, 14.1R8
17.2
14.1X53-D115
20.2R2-S2
14.1X53-D130
17.3R1-S4
13.3 prior to 13.3R7
18.1R1
22.2
12.1X46 prior to 12.1X46-D71
18.2X75-D5
18.4R1-S4, 18.4R2
18.3R1-S3
12.3
21.1R3-S4
21.1R3-S5
12.3R12
17.3R3-S8
17.4
13.2R1
17.4R2-S7, 17.4R3
12.3R12-S19
15.1 prior to 15.1R3
22.1R2
17.3R3-S12
17.3R2-S4
15.1F6-S3
18.2X75 versions prior to 18.2X75-D12 and 18.2X75-D30
20.1R2
14.1 prior to 14.1R8-S3, 14.1R9
14.2 prior to 14.2R7-S7, 14.2R8
21.3R2
20.2R1
All
16.2 16.2
18.2X75-D53, 18.2X75-D65
12.3 prior to 12.3R12
14.1X55 from 14.1X55-D30 prior to 14.1X55-D35
18.1R3-S9
18.2R3, 18.2R3-S1, 18.2R3-S2
18.4R2-S4
20.1R3-S1
15.1 prior to 15.1F2-S16, 15.1F5-S7, 15.1F6-S6, 15.1R5-S2, 15.1R6
17.3R2-S5, 17.3R3-S6
14.1 prior to 14.1R8-S5, 14.1R9
18.2R3
17.4R2-S10, 17.4R3-S2
17.4R2-S11, 17.4R3-S2
15.1X49 prior to 15.1X49-D110
21.1R2
17.1
21.1R3
21.2
12.3X48-D75
13.2X51 prior to 13.2X51-D40
19.1R2-S2, 19.1R3-S1
18.4R3-S6
23.1
18.2R3-S2
18.1X75-D10
21.2R3-S8
22.3R2
15.1F1
21.2R1-S2, 21.2R2-S1
12.3X48 prior to 12.3X48-D55
14.2 prior to 14.2R4-S9, 14.2R7-S8, 14.2R8
15.1X53-D59
18.4R3
12.3R1
16.1R4-S12
20.3R3
15.1X53 prior to 15.1X53-D47, 15.1X53-D62, 15.1X53-D70, 15.1X53-D105
17.2R3-S3
17.1R1
14.2 from 14.2R3 prior to 14.2R7-S8, 14.2R8
19.3R2-S6, 19.3R3-S3
18.3 versions prior to 18.3R1-S2 and to 18.3R2 on SRX Series
19.2R2
17.4R1
14.1 prior to 14.1R4-S12, 14.1R5, 14.1R6
15.1X49 prior to 15.1X49-D20, 15.1X49-D30
17.4R2-S4
12.3X48 prior to 12.3X48-D50, 12.3X48-D55
20.3R1
14.2 prior to 14.2R4-S7, 14.2R6-S4, 14.2R7
16.1R3-S8
14.1X53
17.2 prior to 17.2R1-S1, 17.2R2
22.4R3
17.2X75-D100
20.1R1
15.1X49-D131
20.4R2-S1, 20.4R3
16.1R6
17.1R3
12.1X46 prior to 12.1X46-D50
19.4R2
any
19.4R2-S7, 19.4R3-S5
16.1 versions prior to 16.1R7-S3
15.1R6-S6
18.3R3-S5
20.1
13.3 prior to 13.3R8
0
12.1X46 prior to 12.1X46-D65
15.1X49 versions prior to 15.1X49-D181 and 15.1X49-D190 on SRX Series
16.1X65 prior to 16.1X65-D45
15.1X53 prior to 15.1X53-D231, 15.1X53-D47, 15.1X53-D48, 15.1X53-D57, 15.1X53-D64, 15.1X53-D70
15.1X53 prior to 15.1X53-D47, 15.1X53-D232
17.2 prior to 17.2R1-S2, 17.2R2
17.2R2-S7
15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6
18.2R3-S3
18.1R3-S10
19.1R3-S1
17.4R2-S7
15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7
19.1R1
13.2X51 prior to 13.2X51-D39, 13.2X51-D40
17.4R2-S13
18.1R2
19.1R1-S5, 19.1R2-S2, 19.1R3-S2
18.4R2-S10
22.3
18.3R1
12.1X46-D81
15.1 prior to 15.1F2-S18, 15.1R4
20.3R1-S2
12.1X46 prior to 12.1X46-D40
23.4
15.1F6
18.1 versions prior to 18.1R3-S2
17.3 versions prior to 17.3R3-S4
14.1 prior to 14.1R4-S12, 14.1R7
12.3X48
15.1X49 prior to 15.1X49-D80
18.2X75
22.2R2
12.1X46-D76
16.2R2-S7
18.4R2-S5, 18.4R3-S6
14.1 prior to 14.1R2-S10, 14.1R8-S4, 14.1R9
12.3X48 prior to 12.3X48-D20, 12.3X48-D30
15.1 prior to 15.1F2-S11, 15.1F4-S1-J1, 15.1F5-S3, 15.1F6, 15.1R4
18.2X75-D20
21.4R3-S4
18.4R1-S5, 18.4R2-S4, 18.4R3
Any
16.2 prior to 16.2R2-S1, 16.2R3
15.1X54
19.2R3-S3
14.1X53 prior to 14.1X53-D50
15.1F5-S7
18.2R3-S4
18.2R1
22.2R3-S4
24.2
15.1X49
18.2X75-D50, 18.2X75-D60
20.2
14.1X53 prior to 14.1X53-D122, 14.1X53-D45, 14.1X53-D50
20.3
15.1 prior to 15.1F5, 15.1R3
18.4 versions prior to 18.4R1-S1 and to 18.4R2 on SRX Series
15.1X49 prior to 15.1X49-D75
18.3
21.2R3-S5
18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70
18.4R3-S9
22.3R3
18.1R2-S3, 18.1R3
14.1X53 prior to 14.1X53-D28, 14.1X53-D40
18.3R2
20.2R2
17.3R1-S1, 17.3R2
21.2R1-S1, 21.2R2
19.2R3-S1
12.3 Any
17.3R3-S4, 17.3R3-S5
18.4R2-S5, 18.4R3-S2
18.4R1-S8, 18.4R2-S7
18.4R3-S7
17.2 versions prior to 17.2R3
17.3R2-S4, 17.3R3-S2
15.1 prior to 15.1F2-S18, 15.1F6-S7, 15.1R4-S8, 15.1R5-S5, 15.1R6-S1, 15.1R7
14.1R1
12.1X47 prior to 12.1X47-D45
17.4R3-S3
17.4 versions prior to 17.4R2-S5 and 17.4R3 on EX4300 Series
12.3R
20.4R1
12.1X46 prior to 12.1X46-D45
23.2
15.1X53 versions prior to 15.1X53-D237 and 15.1X53-D496 and 15.1X53-D591 and 15.1X53-D69
17.1 versions prior to 17.1R3
14.1X53 versions prior to 14.1X53-D51 and 14.1X53-D115 on EX4300 Series
13.3 prior to 13.3R4-S11, 13.3R10
11.4 prior to 11.4R13-S3
15.1X49 prior to 15.1X49-D90
15.1X53 prior to 15.1X53-D64, 15.1X53-D70
15.1 prior to 15.1F2, 15.1F3, 15.1R2
16.2R1
12.3X48-D66
15.1X49 prior to 15.1X49-D100
19.4R3-S10
19.4R3-S2
20.4R3-S5
17.4R3
19.4R1-S4, 19.4R3-S2
14.1 prior to 14.1R8-S4, 14.1R9
18.1
19.4R2-S3, 19.4R3
19.3R2-S7, 19.3R3-S3
15.1X49 prior to 15.1X49-D70
17.1R2-S7
20.4
18.3R2-S4, 18.3R3-S2
17.1 prior to 17.1R2-S2, 17.1R3
17.2R2-S6, 17.2R3
14.1X53 prior to 14.1X53-D45, 14.1X53-D50
14.2 prior to 14.2R4
19.2R1-S6
14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9
19.3R3-S2
14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8
22.3R3-S2
14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R6
15.1X49 prior to 15.1X49-D40
17.2 versions prior to 17.2R3-S2 on EX4300 Series
12.3X48 from 12.3X48-D30 and prior to 12.3X48-D35
14.1X55 prior to 14.1X55-D35
12.3X48 prior to 12.3X48-D30
16.1 prior to 16.1R2
15.1X53 prior to 15.1X53-D47
18.4R1
18.1R3-S7
20.3R3-S6
16.1R7
19.1R3-S7
15.1R7-S2
15.1X53-D233
17.2X75 prior to 17.2X75-D30
15.1R from 15.1R5 prior to 15.1R5-S2, 15.1R6
16.2
15.1F7
14.1X53-D47
18.2X75-D50.8 18.2X75-D60
17.2R3-S4
12.3X48 prior to 12.3X48-D20
14.2
16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5
20.3R3-S2
15.1X49 from 15.1X49-D40 and prior to 15.1X49-D50
17.3
20.3R3-S1
17.3R3-S6
16.1 prior to 16.1R3-S3, 16.1R4
14.1X53 prior to 14.1X53-D122, 14.1X53-D44, 14.1X53-D50
19.4R1-S2, 19.4R2
21.3R1
19.4
16.1R7-S8
all versions prior to 15.1R2
15.1X8
20.2R3-S5
21.4R1
18.1R3-S4
17.2R1-S3, 17.2R3
23.4R1
15.1X53 prior to 15.1X53-D33, 15.1X53-D50
15.1X53-D67
17.3R3-S3
18.2R2-S8, 18.2R3-S7
19.4R3
24.2R1
19.1R3
12.3X48 prior to 12.3X48-D32, 12.3X48-D35
17.2R2-S6
17.4R3-S5
16.1R7-S6
21.2R1
12.1X44 prior to 12.1X44-D60
22.1R3
18.4R2
18.2
17.4 versions prior to 17.4R1-S8 and to 17.4R2-S5 and to 17.4R3 on SRX Series
17.2 versions prior to 17.2R1-S8 and 17.2R2-S7 and 17.2R3-S1
22.4
18.1 versions prior to 18.1R2-S4 and 18.1R3-S3
14.1
15.1X53-D471
19.2R3
19.4R3-S4
19.4R1
17.1R1-S7
19.2R1-S2, 19.2R2
20.4R3-S1
12.1X46 prior to 12.1X46-D60
14.1 prior to 14.1R8
15.1X49 prior to 15.1X49-D20
17.4R1-S5
12.1X46
15.1F
17.4 versions prior to 17.4R2
16.2R2-S5
17.1 prior to 17.1R1-S3, 17.1R2
15.1 prior to 15.1R5
16.1X70-D10
18.4R1-S7, 18.4R3-S3
14.2 prior to 14.2R7-S9, 14.2R8
15.1X49-D150
18.2 versions prior to 18.2R1-S5 and 18.2R2-S2 and 18.2R3
22.4R1
23.2R2
20.3R2
18.2 versions prior to 18.2R2-S1 and to 18.2R3 on SRX Series
13.2 prior to 13.2R9
13.3 prior to 13.3R4-S11, 13.3R9
18.2X75-D32, 18.2X75-D33, 18.2X75-D420, 18.2X75-D52, 18.2X75-D60, 18.2X75-D65, 18.2X75-D70
18.2X75-D12, 18.2X75-D33, 18.2X75-D420, 18.2X75-D60,18.2X75-D411
14.2 prior to 14.2R4-S9, 14.2R7-S7, 14.2R8
21.2R3
19.3R2
15.1 prior to 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3
12.3X48 versions prior to 12.3X48-D85 on SRX Series
17.3 prior to 17.3R1-S1, 17.3R2
19.2R1-S5, 19.2R2, 19.2R3
15.1R6-S6, 15.1R7
16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R4-S4, 16.1R5
14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R5
18.3 versions prior to 18.3R2 on EX4300 Series
14.1X53 prior to 14.1X53-D42, 14.1X53-D50
12.3X48 versions prior to 12.3X48-D80
19.2R1-S5, 19.2R2
15.1R7
12.1X46-D71, 12.1X46-D73
15.1R1
19.1R2
12.1X46 prior to 12.3X46-D71
14.2R from 14.2R7 prior to 14.2R7-S4, 14.2R8
16.1R1
19.2
15.1X53-D590
18.4R3-S8
17.3R1
14.1X53 prior to 14.1X53-D30
17.4R2-S4, 17.4R3
16.1R7-S2
17.4R2
18.4R2-S5
18.4R3-S1
14.1 prior to 14.1R6
16.2 prior to 16.2R1-S3, 16.2R2
17.2R3-S1
20.2R3-S2
14.1X50
15.1X53-D235
16.1R5-S4
15.1 prior to 15.1F4, 15.1R3
16.1R6-S6, 16.1R7-S3
12.3R12-S10
12.1X44 prior to 12.1X44-D55
15.1 prior to 15.1F5-S3, 15.1F6, 15.1R4
5.6R1
17.3R3-S9
18.1R3-S6
22.3R1
16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6
21.4R2
12.3 versions prior to 12.3R12-S13
17.2R2
15.1R7-S10
23.2R1
16.2 prior to 16.2R2
18.1 versions prior to 18.1R3
14.2 prior to 14.2R5
15.1R4-S9
16.2R1-S6
all
18.2X75-D420, 18.2X75-D50
17.2 prior to 17.2R1-S3, 17.2R2
18.1 versions prior to 18.1R3-S1 on EX4300 Series
12.1X46 prior to 12.1X46-D67
16.1R6-S3
14.1 from 14.1R5 prior to 14.1R8-S4, 14.1R9
15.1X49 prior to 15.1X49-D91, 15.1X49-D100
19.1
15.1R4, 15.1R5, 15.1R6
12.3 prior to 12.3R10, 12.3R11
15.1X53
18.2R1-S1, 18.2R2
18.3 versions prior to 18.3R1-S4 and 18.3R2
20.1R3-S5
12.3X48 prior to 12.3X48-D50
19.1R3-S3
15.1X49 prior to TPM firmware version 4.43
18.1 versions prior to 18.1R3-S6 on SRX Series
17.4R1-S3
20.1R2-S1
19.2R1
17.2X75 prior to 17.2X75-D50
20.2R3
21.4
21.2R3-S3
18.2X75-D430, 18.2X75-D53, 18.2X75-D60
18.2R3-S6
18.2 versions prior to 18.2R2 on EX4300 Series
14.1X50 prior to 14.1X50-D185
unspecified
12.1X47 prior to 12.1X47-D30
21.4R3-S7
18.1R3-S13
19.3R3-S7
16.1 prior to 16.1R4-S1, 16.1R5
23,2
12.3 prior to 12.3R11
15.1X53 prior to 15.1X53-D51, 15.1X53-D60
22.1R1
21.2R3-S2
15.1X53 prior to 15.1X53-D57, 15.1X53-D70
18.2R2-S6, 18.2R3-S2
21.1
18.1R3-S12
17.4R3-S2
15.1 prior to 15.1F5
18.1X75 all versions
12.3X48-D80
20.2R1-S3, 20.2R2
18.2R2-S7, 18.2R3-S5
17.3 versions prior to 17.3R3-S2
15.1X49 prior to 15.1X49-D60
Recent CVEs
CVE-2025-21598
An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd. This issue affects: Junos OS: * from 21.2R3-S8 before 21.2R3-S9, * from 21.4R3-S7 before 21.4R3-S9, * from 22.2R3-S4 before 22.2R3-S5, * from 22.3R3-S2 before 22.3R3-S4, * from 22.4R3 before 22.4R3-S5, * from 23.2R2 before 23.2R2-S2, * from 23.4R1 before 23.4R2-S1, * from 24.2R1 before 24.2R1-S1, 24.2R2. Junos OS Evolved: * from 21.4R3-S7-EVO before 21.4R3-S9-EVO, * from 22.2R3-S4-EVO before 22.2R3-S5-EVO, * from 22.3R3-S2-EVO before 22.3R3-S4-EVO, * from 22.4R3-EVO before 22.4R3-S5-EVO, * from 23.2R2-EVO before 23.2R2-S2-EVO, * from 23.4R1-EVO before 23.4R2-S1-EVO, * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue requires a BGP session to be established. This issue can propagate and multiply through multiple ASes until reaching vulnerable devices. This issue affects iBGP and eBGP. This issue affects IPv4 and IPv6. An indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue: For example, by issuing the command on the neighboring device: show log messages Reviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating: rpd[<pid>]: Received malformed update from <IP address> (External AS <AS#>) and rpd[<pid>]: Malformed Attribute
CVE-2024-39550
A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps) to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). Memory can only be recovered by manually restarting rtlogd process. The memory usage can be monitored using the below command. user@host> show system processes extensive | match rtlog This issue affects Junos OS on MX Series with SPC3 line card: * from 21.2R3 before 21.2R3-S8, * from 21.4R2 before 21.4R3-S6, * from 22.1 before 22.1R3-S5, * from 22.2 before 22.2R3-S3, * from 22.3 before 22.3R3-S2, * from 22.4 before 22.4R3-S1, * from 23.2 before 23.2R2, * from 23.4 before 23.4R2.
CVE-2024-39541
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart. This issue affects: Junos OS: * 22.4 versions before 22.4R3-S1, * 23.2 versions before 23.2R2, * 23.4 versions before 23.4R1-S1, 23.4R2, This issue does not affect Junos OS versions earlier than 22.4R1. Junos OS Evolved: * 22.4-EVO versions before 22.4R3-S2-EVO, * 23.2-EVO versions before 23.2R2-EVO, * 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO, This issue does not affect Junos OS Evolved versions earlier than before 22.4R1.
CVE-2024-39533
An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions ip-source-address ip-destination-address arp-type which are not supported for this type of filter, are used in an ethernet switching filter, and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect. This issue affects Junos OS on QFX5000 Series and EX4600 Series: * All version before 21.2R3-S7, * 21.4 versions before 21.4R3-S6, * 22.1 versions before 22.1R3-S5, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S2, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. Please note that the implemented fix ensures these unsupported match conditions cannot be committed anymore.
CVE-2024-39561
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an attacker to send TCP packets with SYN/FIN or SYN/RST flags, bypassing the expected blocking of these packets. A TCP packet with SYN/FIN or SYN/RST should be dropped in flowd. However, when no-syn-check and Express Path are enabled, these TCP packets are unexpectedly transferred to the downstream network. This issue affects Junos OS on SRX4600 and SRX5000 Series: * All versions before 21.2R3-S8, * from 21.4 before 21.4R3-S7, * from 22.1 before 22.1R3-S6, * from 22.2 before 22.2R3-S4, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2, * from 23.4 before 23.4R1-S1, 23.4R2.
CVE-2024-30388
An Improper Isolation or Compartmentalization vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series and EX Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If a specific malformed LACP packet is received by a QFX5000 Series, or an EX4400, EX4100 or EX4650 Series device, an LACP flap will occur resulting in traffic loss. This issue affects Junos OS on QFX5000 Series, and on EX4400, EX4100 or EX4650 Series: * 20.4 versions from 20.4R3-S4 before 20.4R3-S8, * 21.2 versions from 21.2R3-S2 before 21.2R3-S6, * 21.4 versions from 21.4R2 before 21.4R3-S4, * 22.1 versions from 22.1R2 before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R2-S2, 22.3R3, * 22.4 versions before 22.4R2-S1, 22.4R3.
CVE-2024-21620
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2.
CVE-2024-21585
An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause the routing protocol daemon (rpd) process to crash and restart, leading to a Denial of Service (DoS) condition. Continued BGP session flapping will create a sustained Denial of Service (DoS) condition. This issue only affects routers configured with non-stop routing (NSR) enabled. Graceful Restart (GR) helper mode, enabled by default, is also required for this issue to be exploitable. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. When the BGP session flaps on the NSR-enabled router, the device enters GR-helper/LLGR-helper mode due to the peer having negotiated GR/LLGR-restarter capability and the backup BGP requests for replication of the GR/LLGR-helper session, master BGP schedules, and initiates replication of GR/LLGR stale routes to the backup BGP. In this state, if the BGP session with the BGP peer comes up again, unsolicited replication is initiated for the peer without cleaning up the ongoing GR/LLGR-helper mode replication. This parallel two instances of replication for the same peer leads to the assert if the BGP session flaps again. This issue affects: Juniper Networks Junos OS * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R3-S4; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. Juniper Networks Junos OS Evolved * All versions earlier than 21.3R3-S5-EVO; * 21.4 versions earlier than 21.4R3-S5-EVO; * 22.1 versions earlier than 22.1R3-S4-EVO; * 22.2 versions earlier than 22.2R3-S3-EVO; * 22.3 versions earlier than 22.3R3-S1-EVO; * 22.4 versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO; * 23.2 versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO.
CVE-2023-36841
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS). An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover. This issue affects interfaces with PPPoE configured and tcp-mss enabled. This issue affects Juniper Networks Junos OS * All versions prior to 20.4R3-S7; * 21.1 version 21.1R1 and later versions; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3; * 22.3 versions prior to 22.3R2-S2; * 22.4 versions prior to 22.4R2;
CVE-2023-36845
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.