The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Juniper Junos OS

computer vulnerability CVE-2018-0044

Juniper NFX: privilege escalation via Insecure Sshd Configuration

Synthesis of the vulnerability

Impacted products: Junos OS.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0044, JSA10878, VIGILANCE-VUL-27485.

Description of the vulnerability

An attacker can bypass restrictions via Insecure Sshd Configuration of Juniper NFX, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2018-0062

Junos OS: denial of service via J-Web

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0062, JSA10897, VIGILANCE-VUL-27484.

Description of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2018-0063

Junos OS: denial of service via Nexthop Index Allocation

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0063, JSA10899, VIGILANCE-VUL-27483.

Description of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2018-0061

Junos OS: denial of service via telnetd

Synthesis of the vulnerability

Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0061, JSA10896, VIGILANCE-VUL-27482.

Description of the vulnerability

An attacker can generate a fatal error via telnetd of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2018-0060

Junos OS: denial of service via DHCP IP/Mask

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CERTFR-2018-AVI-523, CVE-2018-0060, JSA10895, VIGILANCE-VUL-27481.

Description of the vulnerability

An attacker can generate a fatal error via DHCP IP/Mask of Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2018-0058

Juniper MX Series: denial of service via IPv6 Exception

Synthesis of the vulnerability

An attacker can send malicious IPv6 Exception packets to Juniper MX Series, in order to trigger a denial of service.
Impacted products: Junos OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0058, JSA10893, VIGILANCE-VUL-27479.

Description of the vulnerability

The Juniper MX Series product has a service to manage received IPv6 Exception packets.

However, when malicious IPv6 Exception packets are received, a fatal error occurs.

An attacker can therefore send malicious IPv6 Exception packets to Juniper MX Series, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2018-0057

Junos OS: privilege escalation via DHCP Option 50

Synthesis of the vulnerability

Impacted products: Juniper J-Series, Junos OS.
Severity: 2/4.
Consequences: privileged access/rights, data reading.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0057, JSA10892, VIGILANCE-VUL-27478.

Description of the vulnerability

An attacker can bypass restrictions via DHCP Option 50 of Junos OS, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2018-0056

Juniper MX Series: denial of service via L2ALD

Synthesis of the vulnerability

Impacted products: Junos OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0056, JSA10890, VIGILANCE-VUL-27477.

Description of the vulnerability

An attacker can generate a fatal error via L2ALD of Juniper MX Series, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2018-0055

Junos OS: denial of service via DHCPv6

Synthesis of the vulnerability

An attacker can send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0055, JSA10889, VIGILANCE-VUL-27476.

Description of the vulnerability

The Junos OS product has a service to manage received DHCPv6 packets.

However, when malicious DHCPv6 packets are received, a fatal error occurs.

An attacker can therefore send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2018-0054

Juniper EX4600: denial of service via Ethernet/ARP Storm

Synthesis of the vulnerability

Impacted products: Juniper EX-Series, Junos OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Confidence: confirmed by the editor (5/5).
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0054, JSA10888, VIGILANCE-VUL-27475.

Description of the vulnerability

An attacker can generate a fatal error of Juniper EX4600, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Juniper Junos OS: