
CVE-2018-0002 – MX series, SRX series: Junos OS: Denial of service vulnerability in Flowd on devices with ALG enabled.
https://notcve.org/view.php?id=CVE-2018-0002
10 Jan 2018 — On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in an extended Denial of Service condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D60 on SRX series; 12.3X48 versions prior to 12.3X48-D35 on SRX series; 14.1 versions prio... • http://www.securitytracker.com/id/1040178 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-0009 – SRX Series: Firewall bypass vulnerability when UUID with leading zeros is configured.
https://notcve.org/view.php?id=CVE-2018-0009
10 Jan 2018 — On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewall bypass condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX series; 12.3X48 versions prior to 12.3X48-D55 on SRX series; 15.1X49 versions prior to 15.1X49-D100 on SRX series. En... • http://www.securityfocus.com/bid/102491 •

CVE-2018-0001 – Junos: Unauthenticated Remote Code Execution through J-Web interface
https://notcve.org/view.php?id=CVE-2018-0001
10 Jan 2018 — A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2... • http://www.securityfocus.com/bid/103092 • CWE-416: Use After Free •

CVE-2018-0003 – Junos OS: A crafted MPLS packet may lead to a kernel crash
https://notcve.org/view.php?id=CVE-2018-0003
10 Jan 2018 — A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D4... • http://www.securityfocus.com/bid/105715 •

CVE-2018-0004 – Junos OS: Kernel Denial of Service Vulnerability
https://notcve.org/view.php?id=CVE-2018-0004
10 Jan 2018 — A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversely one or more running processes running on the system. Once this occurs, the high CPU event(s) affects either or both the forwarding and control plane. As a result of this condition the device can become inaccessi... • http://www.securitytracker.com/id/1040183 • CWE-400: Uncontrolled Resource Consumption •

CVE-2016-4922 – Junos: Privilege escalation vulnerabilities in Junos CLI
https://notcve.org/view.php?id=CVE-2016-4922
13 Oct 2017 — Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achieve elevated privileges and gain complete control of the device. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X46 prior to 12.1X46-D60; 12.1X47 prior to 12.1X47-D45; 12.3 prior to 12.3R12; 12.3X48 prior to 12.3X48-D35; 13.2 prior ... • http://www.securityfocus.com/bid/93534 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2017-10620 – SRX Series: Antivirus updates are downloaded without verification
https://notcve.org/view.php?id=CVE-2017-10620
13 Oct 2017 — Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110; Juniper Networks Junos OS en dispositivos de la serie SRX no verifica el certificado del servidor HTTPS... • https://kb.juniper.net/JSA10822 • CWE-295: Improper Certificate Validation •

CVE-2017-10608 – SRX series: Junos OS: SRX series using IPv6 Sun/MS-RPC ALGs may experience flowd crash on processing packets.
https://notcve.org/view.php?id=CVE-2017-10608
13 Oct 2017 — Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a repeated denial of service against the target. Repeated traffic in a cluster may cause repeated flip-flop failure operations or full failure to the flowd daemon halting traffic on all nodes. Only IPv6 traffic is affected by this issue. IPv4 traffic is unaffected... • https://kb.juniper.net/JSA10811 • CWE-400: Uncontrolled Resource Consumption •

CVE-2016-4921 – Junos: IPv6 denial of service vulnerability due to resource exhaustion (CVE-2016-4921)
https://notcve.org/view.php?id=CVE-2016-4921
13 Oct 2017 — By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. • http://www.securityfocus.com/bid/93532 • CWE-399: Resource Management Errors •

CVE-2017-10610 – SRX Series: Embedded ICMP may cause the flowd process to crash
https://notcve.org/view.php?id=CVE-2017-10610
13 Oct 2017 — On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This issue only occurs if NAT64 is configured. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D71, 12.3X48 prior to 12.3X48-D55, 15.1X49 prior to 15.1X49-D100 on SRX Series. No other Juniper Networks products or platforms are affected by this... • https://kb.juniper.net/JSA10813 • CWE-20: Improper Input Validation •