The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Juniper J-Series

vulnerability note CVE-2018-0062

Junos OS: denial of service via J-Web

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0062, JSA10897, VIGILANCE-VUL-27484.

Description of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2018-0063

Junos OS: denial of service via Nexthop Index Allocation

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0063, JSA10899, VIGILANCE-VUL-27483.

Description of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2018-0060

Junos OS: denial of service via DHCP IP/Mask

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CERTFR-2018-AVI-523, CVE-2018-0060, JSA10895, VIGILANCE-VUL-27481.

Description of the vulnerability

An attacker can generate a fatal error via DHCP IP/Mask of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2018-0057

Junos OS: privilege escalation via DHCP Option 50

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS.
Severity: 2/4.
Consequences: privileged access/rights, data reading.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0057, JSA10892, VIGILANCE-VUL-27478.

Description of the vulnerability

An attacker can bypass restrictions via DHCP Option 50 of Junos OS, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2018-0055

Junos OS: denial of service via DHCPv6

Synthesis of the vulnerability

An attacker can send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0055, JSA10889, VIGILANCE-VUL-27476.

Description of the vulnerability

The Junos OS product has a service to manage received DHCPv6 packets.

However, when malicious DHCPv6 packets are received, a fatal error occurs.

An attacker can therefore send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2018-0732

OpenSSL: denial of service via Large DH Parameter

Synthesis of the vulnerability

Impacted products: Blue Coat CAS, ProxyAV, ProxyRA, ProxySG par Blue Coat, SGOS by Blue Coat, Debian, BIG-IP Hardware, TMOS, AIX, IBM i, Rational ClearCase, Copssh, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, MariaDB ~ precise, MySQL Community, MySQL Enterprise, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, XtraDB Cluster, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, SGOS by Symantec, Nessus, Ubuntu, X2GoClient.
Severity: 2/4.
Consequences: denial of service on client.
Provenance: internet server.
Confidence: confirmed by the editor (5/5).
Creation date: 12/06/2018.
Identifiers: bulletinjul2018, CERTFR-2018-AVI-511, CERTFR-2018-AVI-607, cpujan2019, cpuoct2018, CVE-2018-0732, DLA-1449-1, DSA-4348-1, DSA-4355-1, ibm10719319, ibm10729805, ibm10738401, ibm10743283, JSA10919, K21665601, openSUSE-SU-2018:1906-1, openSUSE-SU-2018:2117-1, openSUSE-SU-2018:2129-1, openSUSE-SU-2018:2667-1, openSUSE-SU-2018:2695-1, openSUSE-SU-2018:2816-1, openSUSE-SU-2018:2855-1, openSUSE-SU-2018:3013-1, openSUSE-SU-2018:3015-1, PAN-SA-2018-0015, RHSA-2018:3221-01, SSA:2018-226-01, SUSE-SU-2018:1887-1, SUSE-SU-2018:1968-1, SUSE-SU-2018:2036-1, SUSE-SU-2018:2041-1, SUSE-SU-2018:2207-1, SUSE-SU-2018:2647-1, SUSE-SU-2018:2683-1, SUSE-SU-2018:2812-1, SUSE-SU-2018:2956-1, SUSE-SU-2018:2965-1, SYMSA1462, TNS-2018-14, TNS-2018-17, USN-3692-1, USN-3692-2, VIGILANCE-VUL-26375.

Description of the vulnerability

An attacker can generate a fatal error via Large DH Parameter of OpenSSL, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2018-0737

OpenSSL: information disclosure via RSA Constant Time Key Generation

Synthesis of the vulnerability

Impacted products: Debian, AIX, IBM i, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, MariaDB ~ precise, MySQL Community, MySQL Enterprise, OpenBSD, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, XtraDB Cluster, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Nessus, Ubuntu, X2GoClient.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Confidence: confirmed by the editor (5/5).
Creation date: 17/04/2018.
Identifiers: bulletinjul2018, CERTFR-2018-AVI-511, CERTFR-2018-AVI-607, cpujan2019, cpuoct2018, CVE-2018-0737, DLA-1449-1, DSA-4348-1, DSA-4355-1, ibm10729805, ibm10743283, JSA10919, openSUSE-SU-2018:2695-1, openSUSE-SU-2018:2957-1, openSUSE-SU-2018:3015-1, PAN-SA-2018-0015, RHSA-2018:3221-01, SSA:2018-226-01, SUSE-SU-2018:2486-1, SUSE-SU-2018:2492-1, SUSE-SU-2018:2683-1, SUSE-SU-2018:2928-1, SUSE-SU-2018:2965-1, SUSE-SU-2018:3864-1, TNS-2018-14, TNS-2018-17, USN-3628-1, USN-3628-2, USN-3692-1, USN-3692-2, VIGILANCE-VUL-25884.

Description of the vulnerability

An attacker can bypass access restrictions to data via RSA Constant Time Key Generation of OpenSSL, in order to obtain sensitive information.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2018-0022

Junos OS: memory leak via MPLS/VPLS

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/04/2018.
Identifiers: CERTFR-2018-AVI-184, CVE-2018-0022, JSA10855, VIGILANCE-VUL-25854.

Description of the vulnerability

An attacker can create a memory leak via MPLS/VPLS of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2018-0021

Junos OS: Man-in-the-Middle via Short MacSec Keys

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Confidence: confirmed by the editor (5/5).
Creation date: 12/04/2018.
Identifiers: CERTFR-2018-AVI-184, CVE-2018-0021, JSA10854, VIGILANCE-VUL-25853.

Description of the vulnerability

An attacker can act as a Man-in-the-Middle via Short MacSec Keys on Junos OS, in order to read or write data in the session.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2018-0020

Junos OS: denial of service via BGP UPDATE

Synthesis of the vulnerability

An attacker can send malicious BGP UPDATE packets to Junos OS, in order to trigger a denial of service.
Impacted products: Juniper J-Series, Junos OS, SRX-Series.
Severity: 3/4.
Consequences: denial of service on service.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 12/04/2018.
Identifiers: CERTFR-2018-AVI-184, CVE-2018-0020, JSA10848, VIGILANCE-VUL-25850.

Description of the vulnerability

The Junos OS product has a service to manage received BGP UPDATE packets.

However, when malicious BGP UPDATE packets are received, a fatal error occurs.

An attacker can therefore send malicious BGP UPDATE packets to Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Juniper J-Series: