The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Juniper J-Series

vulnerability announce 29012

Junos OS: privilege escalation via gRPC Hardcoded Credentials

Synthesis of the vulnerability

An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 11/04/2019.
Revision date: 12/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0034-REJECT, JSA10923, VIGILANCE-VUL-29012.

Description of the vulnerability

An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-0043

Junos OS: denial of service via RPD SNMP

Synthesis of the vulnerability

An attacker can send malicious RPD SNMP packets to Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0043, JSA10935, VIGILANCE-VUL-29023.

Description of the vulnerability

An attacker can send malicious RPD SNMP packets to Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-0040

Junos OS: information disclosure via RPC

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via RPC of Junos OS, in order to obtain sensitive information.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0040, JSA10929, TSB17563, VIGILANCE-VUL-29018.

Description of the vulnerability

An attacker can bypass access restrictions to data via RPC of Junos OS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-0039

Junos OS: privilege escalation via REST API Brute Force

Synthesis of the vulnerability

An attacker can bypass restrictions via REST API Brute Force of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0039, JSA10928, TSB17563, TSB17568, TSB17572, VIGILANCE-VUL-29017.

Description of the vulnerability

An attacker can bypass restrictions via REST API Brute Force of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2019-0037

Junos OS: denial of service via jdhcpd DHCPv6 Solicit

Synthesis of the vulnerability

An attacker can trigger a fatal error via jdhcpd DHCPv6 Solicit of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: LAN.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0037, JSA10926, TSB17563, TSB17568, VIGILANCE-VUL-29015.

Description of the vulnerability

An attacker can trigger a fatal error via jdhcpd DHCPv6 Solicit of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-0035

Junos OS: privilege escalation via OAM Volumes Password Recovery

Synthesis of the vulnerability

An attacker can bypass restrictions via OAM Volumes Password Recovery of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0035, JSA10924, TSB17563, TSB17568, TSB17572, VIGILANCE-VUL-29013.

Description of the vulnerability

An attacker can bypass restrictions via OAM Volumes Password Recovery of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-0031

Junos OS: denial of service via jdhcpd

Synthesis of the vulnerability

An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: LAN.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0031, JSA10920, VIGILANCE-VUL-29009.

Description of the vulnerability

An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2019-1559

OpenSSL 1.0.2: information disclosure via 0-byte Record Padding Oracle

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via 0-byte Record Padding Oracle of OpenSSL 1.0.2, in order to obtain sensitive information.
Impacted products: SDS, SES, SNS, Debian, AIX, IBM i, Rational ClearCase, Tivoli Storage Manager, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, MariaDB ~ precise, McAfee Web Gateway, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Fusion Middleware, Oracle Identity Management, Solaris, WebLogic, Percona Server, RHEL, SIMATIC, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, WinSCP.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 26/02/2019.
Identifiers: bulletinapr2019, bulletinjul2019, CERTFR-2019-AVI-080, CERTFR-2019-AVI-132, CERTFR-2019-AVI-214, CERTFR-2019-AVI-325, cpuapr2019, cpujul2019, CVE-2019-1559, DLA-1701-1, DSA-4400-1, ibm10876638, ibm10886237, ibm10886659, JSA10949, openSUSE-SU-2019:1076-1, openSUSE-SU-2019:1105-1, openSUSE-SU-2019:1173-1, openSUSE-SU-2019:1175-1, openSUSE-SU-2019:1432-1, openSUSE-SU-2019:1637-1, RHBUG-1683804, RHBUG-1683807, RHSA-2019:2304-01, RHSA-2019:2471-01, SB10282, SSA:2019-057-01, SSB-439005, STORM-2019-001, SUSE-SU-2019:0572-1, SUSE-SU-2019:0600-1, SUSE-SU-2019:0658-1, SUSE-SU-2019:0803-1, SUSE-SU-2019:0818-1, SUSE-SU-2019:1362-1, SUSE-SU-2019:14091-1, SUSE-SU-2019:14092-1, SUSE-SU-2019:1553-1, SUSE-SU-2019:1608-1, TNS-2019-02, USN-3899-1, VIGILANCE-VUL-28600.

Description of the vulnerability

An attacker can bypass access restrictions to data via 0-byte Record Padding Oracle of OpenSSL 1.0.2, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-0062

Junos OS: denial of service via J-Web

Synthesis of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0062, JSA10897, VIGILANCE-VUL-27484.

Description of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-0063

Junos OS: denial of service via Nexthop Index Allocation

Synthesis of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0063, JSA10899, VIGILANCE-VUL-27483.

Description of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Juniper J-Series: