The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Juniper Junos OS

computer vulnerability note CVE-2019-0015

Junos OS SRX: privilege escalation via Deleted Dynamic VPN Users

Synthesis of the vulnerability

An attacker can bypass restrictions via Deleted Dynamic VPN Users of Junos OS SRX, in order to escalate his privileges.
Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: user access/rights.
Provenance: user account.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0015, JSA10915, VIGILANCE-VUL-28229.

Description of the vulnerability

An attacker can bypass restrictions via Deleted Dynamic VPN Users of Junos OS SRX, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-0014

Junos OS: denial of service via J-Flow

Synthesis of the vulnerability

An attacker can trigger a fatal error via J-Flow of Junos OS, in order to trigger a denial of service.
Impacted products: Junos OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0014, JSA10914, VIGILANCE-VUL-28228.

Description of the vulnerability

An attacker can trigger a fatal error via J-Flow of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2019-0013

Junos OS: denial of service via PIM

Synthesis of the vulnerability

An attacker can send malicious PIM packets to Junos OS, in order to trigger a denial of service.
Impacted products: Junos OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0013, JSA10913, VIGILANCE-VUL-28227.

Description of the vulnerability

An attacker can send malicious PIM packets to Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2019-0011

Junos OS: denial of service via Out Of Band Management Interface

Synthesis of the vulnerability

An attacker can trigger a fatal error via Out Of Band Management Interface of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0011, JSA10911, VIGILANCE-VUL-28225.

Description of the vulnerability

An attacker can trigger a fatal error via Out Of Band Management Interface of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-0009

Junos OS EX: denial of service via High Disk I/O Operations

Synthesis of the vulnerability

An attacker can trigger a fatal error via High Disk I/O Operations of Junos OS EX, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Junos OS.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0009, JSA10909, VIGILANCE-VUL-28223.

Description of the vulnerability

An attacker can trigger a fatal error via High Disk I/O Operations of Junos OS EX, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-0005

Junos OS EX/QFX: privilege escalation via Stateless Firewall IPv6 Extension Headers

Synthesis of the vulnerability

An attacker can bypass restrictions via Stateless Firewall IPv6 Extension Headers of Junos OS EX/QFX, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Junos OS.
Severity: 2/4.
Consequences: data flow.
Provenance: internet client.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CERTFR-2019-AVI-066, CVE-2019-0005, JSA10905, VIGILANCE-VUL-28221.

Description of the vulnerability

An attacker can bypass restrictions via Stateless Firewall IPv6 Extension Headers of Junos OS EX/QFX, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-0002

Junos OS EX Series: privilege escalation via Stateless Firewall Filter

Synthesis of the vulnerability

An attacker can bypass restrictions via Stateless Firewall Filter of Junos OS EX Series, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Junos OS.
Severity: 2/4.
Consequences: data flow.
Provenance: internet client.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0002, JSA10901, VIGILANCE-VUL-28218.

Description of the vulnerability

An attacker can bypass restrictions via Stateless Firewall Filter of Junos OS EX Series, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-0044

Juniper NFX: privilege escalation via Insecure Sshd Configuration

Synthesis of the vulnerability

An attacker can bypass restrictions via Insecure Sshd Configuration of Juniper NFX, in order to escalate his privileges.
Impacted products: Junos OS.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet client.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0044, JSA10878, VIGILANCE-VUL-27485.

Description of the vulnerability

An attacker can bypass restrictions via Insecure Sshd Configuration of Juniper NFX, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-0062

Junos OS: denial of service via J-Web

Synthesis of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0062, JSA10897, VIGILANCE-VUL-27484.

Description of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-0063

Junos OS: denial of service via Nexthop Index Allocation

Synthesis of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0063, JSA10899, VIGILANCE-VUL-27483.

Description of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Juniper Junos OS: