The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Juniper SRX-Series

vulnerability announce 29012

Junos OS: privilege escalation via gRPC Hardcoded Credentials

Synthesis of the vulnerability

An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 11/04/2019.
Revision date: 12/04/2019.
Identifiers: CERTFR-2019-AVI-161, CVE-2019-0034-REJECT, JSA10923, VIGILANCE-VUL-29012.

Description of the vulnerability

An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-0015

Junos OS SRX: privilege escalation via Deleted Dynamic VPN Users

Synthesis of the vulnerability

An attacker can bypass restrictions via Deleted Dynamic VPN Users of Junos OS SRX, in order to escalate his privileges.
Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: user access/rights.
Provenance: user account.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0015, JSA10915, VIGILANCE-VUL-28229.

Description of the vulnerability

An attacker can bypass restrictions via Deleted Dynamic VPN Users of Junos OS SRX, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2019-0011

Junos OS: denial of service via Out Of Band Management Interface

Synthesis of the vulnerability

An attacker can trigger a fatal error via Out Of Band Management Interface of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 10/01/2019.
Identifiers: CERTFR-2019-AVI-014, CVE-2019-0011, JSA10911, VIGILANCE-VUL-28225.

Description of the vulnerability

An attacker can trigger a fatal error via Out Of Band Management Interface of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-0062

Junos OS: denial of service via J-Web

Synthesis of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0062, JSA10897, VIGILANCE-VUL-27484.

Description of the vulnerability

An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-0063

Junos OS: denial of service via Nexthop Index Allocation

Synthesis of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: document.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0063, JSA10899, VIGILANCE-VUL-27483.

Description of the vulnerability

An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2018-0061

Junos OS: denial of service via telnetd

Synthesis of the vulnerability

An attacker can generate a fatal error via telnetd of Junos OS, in order to trigger a denial of service.
Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: intranet client.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0061, JSA10896, VIGILANCE-VUL-27482.

Description of the vulnerability

An attacker can generate a fatal error via telnetd of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-0060

Junos OS: denial of service via DHCP IP/Mask

Synthesis of the vulnerability

An attacker can generate a fatal error via DHCP IP/Mask of Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CERTFR-2018-AVI-523, CVE-2018-0060, JSA10895, VIGILANCE-VUL-27481.

Description of the vulnerability

An attacker can generate a fatal error via DHCP IP/Mask of Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-0055

Junos OS: denial of service via DHCPv6

Synthesis of the vulnerability

An attacker can send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service.
Impacted products: Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0055, JSA10889, VIGILANCE-VUL-27476.

Description of the vulnerability

The Junos OS product has a service to manage received DHCPv6 packets.

However, when malicious DHCPv6 packets are received, a fatal error occurs.

An attacker can therefore send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-0053

Juniper vSRX: privilege escalation via Booted Up

Synthesis of the vulnerability

An attacker can bypass restrictions via Booted Up of Juniper vSRX, in order to escalate his privileges.
Impacted products: Junos OS, SRX-Series.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: physical access.
Creation date: 11/10/2018.
Identifiers: CERTFR-2018-AVI-487, CVE-2018-0053, JSA10887, VIGILANCE-VUL-27474.

Description of the vulnerability

An attacker can bypass restrictions via Booted Up of Juniper vSRX, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2018-6924

FreeBSD: out-of-bounds memory reading via ELF Header

Synthesis of the vulnerability

An attacker can force a read at an invalid address via ELF Header of FreeBSD, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: FreeBSD, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, pfSense.
Severity: 2/4.
Consequences: data reading, denial of service on server.
Provenance: document.
Creation date: 12/09/2018.
Identifiers: CERTFR-2019-AVI-169, CVE-2018-6924, FreeBSD-SA-18:12.elf, JSA10937, VIGILANCE-VUL-27220.

Description of the vulnerability

An attacker can force a read at an invalid address via ELF Header of FreeBSD, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Juniper SRX-Series: