Page 2 of 8 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 22EXPL: 0

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series. El software de la serie vMX emplea un número de secuencia IP ID predecible. • http://www.securityfocus.com/bid/106564 https://kb.juniper.net/JSA10903 • CWE-330: Use of Insufficiently Random Values •

CVSS: 6.5EPSS: 0%CPEs: 174EXPL: 0

If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if 'extended-statistics' are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue. • https://kb.juniper.net/JSA10814 •

CVSS: 7.1EPSS: 0%CPEs: 19EXPL: 0

The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete. Los routers de la serie Juniper MX Series con Junos 13.3R3 hasta 13.3Rx anterior a 13.3R6, 14.1 anterior a 14.1R4, 14.1X50 anterior a 14.1X50-D70, y 14.2 anterior a 14.2R2, cuando son configurados como un router BBE, permiten a atacantes remotos causar una denegación de servicio (caída de jpppd y reinicio) mediante el envío de una solicitud de autenticación PAP manipulada después de que las fases PPPoE Discovery y LCP estén completadas. • http://www.securityfocus.com/bid/72070 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10665 • CWE-20: Improper Input Validation •