
CVE-2017-10620 – SRX Series: Antivirus updates are downloaded without verification
https://notcve.org/view.php?id=CVE-2017-10620
13 Oct 2017 — Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110; Juniper Networks Junos OS en dispositivos de la serie SRX no verifica el certificado del servidor HTTPS... • https://kb.juniper.net/JSA10822 • CWE-295: Improper Certificate Validation •

CVE-2017-10621 – Junos OS: Denial of service vulnerability in telnetd
https://notcve.org/view.php?id=CVE-2017-10621
13 Oct 2017 — A denial of service vulnerability in telnetd service on Juniper Networks Junos OS allows remote unauthenticated attackers to cause a denial of service. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D50; 14.1 prior to 14.1R8-S5, 14.1R9; 14.1X53 prior to 14.1X53-D50; 14.2 prior to 14.2R7-S9, 14.2R8; 15.1 prior to 15.1F2-S16, 15.1F5-S7, 15.1F6-S6, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D90; 15.1X53 prior to 15.1X53-D47; 16.1 prior to 16.1R4-S1, 16.1R5; 16.2 prior t... • https://kb.juniper.net/JSA10817 • CWE-400: Uncontrolled Resource Consumption •

CVE-2016-4921 – Junos: IPv6 denial of service vulnerability due to resource exhaustion (CVE-2016-4921)
https://notcve.org/view.php?id=CVE-2016-4921
13 Oct 2017 — By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. • http://www.securityfocus.com/bid/93532 • CWE-399: Resource Management Errors •

CVE-2017-10608 – SRX series: Junos OS: SRX series using IPv6 Sun/MS-RPC ALGs may experience flowd crash on processing packets.
https://notcve.org/view.php?id=CVE-2017-10608
13 Oct 2017 — Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a repeated denial of service against the target. Repeated traffic in a cluster may cause repeated flip-flop failure operations or full failure to the flowd daemon halting traffic on all nodes. Only IPv6 traffic is affected by this issue. IPv4 traffic is unaffected... • https://kb.juniper.net/JSA10811 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-10610 – SRX Series: Embedded ICMP may cause the flowd process to crash
https://notcve.org/view.php?id=CVE-2017-10610
13 Oct 2017 — On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This issue only occurs if NAT64 is configured. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D71, 12.3X48 prior to 12.3X48-D55, 15.1X49 prior to 15.1X49-D100 on SRX Series. No other Juniper Networks products or platforms are affected by this... • https://kb.juniper.net/JSA10813 • CWE-20: Improper Input Validation •

CVE-2016-4922 – Junos: Privilege escalation vulnerabilities in Junos CLI
https://notcve.org/view.php?id=CVE-2016-4922
13 Oct 2017 — Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achieve elevated privileges and gain complete control of the device. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X46 prior to 12.1X46-D60; 12.1X47 prior to 12.1X47-D45; 12.3 prior to 12.3R12; 12.3X48 prior to 12.3X48-D35; 13.2 prior ... • http://www.securityfocus.com/bid/93534 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2017-10619 – Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets
https://notcve.org/view.php?id=CVE-2017-10619
13 Oct 2017 — When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled b... • https://kb.juniper.net/JSA10821 •

CVE-2017-2345 – Junos: snmpd denial of service upon receipt of crafted SNMP packet
https://notcve.org/view.php?id=CVE-2017-2345
14 Jul 2017 — On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial denial of service condition. Additionally, it may be possible to craft a malicious SNMP packet in a way that can result in remote code execution. SNMP is disabled in Junos OS by default. Junos OS devices with SNMP disabled are not affected by this issue. • http://www.securityfocus.com/bid/99567 • CWE-20: Improper Input Validation •

CVE-2017-2347 – Junos: Denial of Service vulnerability in rpd daemon
https://notcve.org/view.php?id=CVE-2017-2347
14 Jul 2017 — A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affected releases are Junos OS 12.3X48 prior to 12.3X48-D50, 12.3X48-D55; 13.3 prior to 13.3R10; 14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9; 14.1X53 prior to 14.1X53-D42, 14.1X53-D50; 14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8; 15.1 prior... • http://www.securityfocus.com/bid/100236 • CWE-20: Improper Input Validation •

CVE-2017-2343 – SRX Series: Hardcoded credentials in Integrated UserFW feature.
https://notcve.org/view.php?id=CVE-2017-2343
14 Jul 2017 — The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services authentication API, hardcoded credentials were identified and removed which can impact both the SRX Series device, and potentially LDAP and Active Directory integrated points. An attacker may be able to completely compromise SRX Series... • http://www.securitytracker.com/id/1038904 • CWE-798: Use of Hard-coded Credentials •