The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Juniper Junos OS

vulnerability bulletin CVE-2019-0049

Junos OS: denial of service via BGP Peer Restarts

Synthesis of the vulnerability

An attacker can trigger a fatal error via BGP Peer Restarts of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: internet client.
Creation date: 11/07/2019.
Identifiers: CERTFR-2019-AVI-325, CVE-2019-0049, JSA10943, VIGILANCE-VUL-29743.

Description of the vulnerability

An attacker can trigger a fatal error via BGP Peer Restarts of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2019-0048

Junos OS: privilege escalation via EX4300 Firewall Filter

Synthesis of the vulnerability

An attacker can bypass restrictions via EX4300 Firewall Filter of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Junos OS.
Severity: 2/4.
Consequences: data flow.
Provenance: intranet client.
Creation date: 11/07/2019.
Identifiers: CERTFR-2019-AVI-325, CVE-2019-0048, JSA10942, VIGILANCE-VUL-29742.

Description of the vulnerability

An attacker can bypass restrictions via EX4300 Firewall Filter of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-0046

Junos OS: denial of service via EX4300 Management Interface

Synthesis of the vulnerability

An attacker can trigger a fatal error via EX4300 Management Interface of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Junos OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 11/07/2019.
Identifiers: CERTFR-2019-AVI-325, CVE-2019-0046, JSA10938, VIGILANCE-VUL-29741.

Description of the vulnerability

An attacker can trigger a fatal error via EX4300 Management Interface of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2019-0044

Junos OS SRX5000: denial of service via fxp0 Packet

Synthesis of the vulnerability

An attacker can trigger a fatal error via fxp0 Packet of Junos OS SRX5000, in order to trigger a denial of service.
Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 11/04/2019.
Revision date: 25/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0044, JSA10936, VIGILANCE-VUL-29024.

Description of the vulnerability

An attacker can trigger a fatal error via fxp0 Packet of Junos OS SRX5000, in order to trigger a denial of service.

See also the similar bulletin VIGILANCE-VUL-29016.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2019-0038

Junos OS SRX: denial of service via fxp0

Synthesis of the vulnerability

An attacker can trigger a fatal error via fxp0 of Junos OS SRX, in order to trigger a denial of service.
Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet server.
Creation date: 11/04/2019.
Revision date: 25/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0038, JSA10927, VIGILANCE-VUL-29016.

Description of the vulnerability

An attacker can trigger a fatal error via fxp0 of Junos OS SRX, in order to trigger a denial of service.

See also the similar bulletin VIGILANCE-VUL-29024.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 29012

Junos OS: privilege escalation via gRPC Hardcoded Credentials

Synthesis of the vulnerability

An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 11/04/2019.
Revision date: 12/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0034-REJECT, JSA10923, VIGILANCE-VUL-29012.

Description of the vulnerability

An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-0043

Junos OS: denial of service via RPD SNMP

Synthesis of the vulnerability

An attacker can send malicious RPD SNMP packets to Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0043, JSA10935, VIGILANCE-VUL-29023.

Description of the vulnerability

An attacker can send malicious RPD SNMP packets to Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2019-0041

Junos OS EX4300-MP: information disclosure via Transit Network Traffic Control Plane

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Transit Network Traffic Control Plane of Junos OS EX4300-MP, in order to obtain sensitive information.
Impacted products: Juniper EX-Series, Junos OS.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0041, JSA10933, VIGILANCE-VUL-29022.

Description of the vulnerability

An attacker can bypass access restrictions to data via Transit Network Traffic Control Plane of Junos OS EX4300-MP, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-0040

Junos OS: information disclosure via RPC

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via RPC of Junos OS, in order to obtain sensitive information.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0040, JSA10929, TSB17563, VIGILANCE-VUL-29018.

Description of the vulnerability

An attacker can bypass access restrictions to data via RPC of Junos OS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-0039

Junos OS: privilege escalation via REST API Brute Force

Synthesis of the vulnerability

An attacker can bypass restrictions via REST API Brute Force of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet client.
Creation date: 11/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0039, JSA10928, TSB17563, TSB17568, TSB17572, VIGILANCE-VUL-29017.

Description of the vulnerability

An attacker can bypass restrictions via REST API Brute Force of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Juniper Junos OS: