
CVE-2020-1660 – Junos OS: MX Series: Receipt of specific packets can cause services card to restart when DNS filtering is configured.
https://notcve.org/view.php?id=CVE-2020-1660
16 Oct 2020 — When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerabil... • https://kb.juniper.net/JSA11054 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2020-1657 – Junos OS: SRX Series: An attacker sending spoofed packets to IPSec peers may cause a Denial of Service.
https://notcve.org/view.php?id=CVE-2020-1657
16 Oct 2020 — On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of these spoofed packets can cause a sustained Denial of Service (DoS) condition. This issue affects IPv4 and IPv6 implementations. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 1... • https://kb.juniper.net/JSA11050 • CWE-408: Incorrect Behavior Order: Early Amplification •

CVE-2020-1656 – Junos OS: When a DHCPv6 Relay-Agent is configured upon receipt of a specific DHCPv6 client message, Remote Code Execution may occur.
https://notcve.org/view.php?id=CVE-2020-1656
16 Oct 2020 — The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to potentially perform a Remote Code Execution (RCE) attack on the target device. Continuous receipt of the specific DHCPv6 client message will result in an extended Denial of Service (DoS) condition. If adjacent devices... • https://kb.juniper.net/JSA11049 • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •

CVE-2020-1655 – Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmentation
https://notcve.org/view.php?id=CVE-2020-1655
17 Jul 2020 — When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of large packets requiring fragmentation, generating the following error messages: [LOG: Err] MQSS(0): WO: Packet Error - Error Packets 1, Connection 29 [LOG: Err] eachip_hmcif_rx_intr_handler(7259): EA[0:0]: HMCIF Rx: Injected checksum error detected on WO ... • https://kb.juniper.net/JSA11041 •

CVE-2020-1654 – Junos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is enabled may can lead to flowd process crash or remote code execution
https://notcve.org/view.php?id=CVE-2020-1654
17 Jul 2020 — On Juniper Networks SRX Series with ICAP (Internet Content Adaptation Protocol) redirect service enabled, processing a malformed HTTP message can lead to a Denial of Service (DoS) or Remote Code Execution (RCE) Continued processing of this malformed HTTP message may result in an extended Denial of Service (DoS) condition. The offending HTTP message that causes this issue may originate both from the HTTP server or the HTTP client. This issue affects Juniper Networks Junos OS on SRX Series: 18.1 versions prio... • https://kb.juniper.net/JSA11031 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2020-1653 – Junos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak
https://notcve.org/view.php?id=CVE-2020-1653
17 Jul 2020 — On Juniper Networks Junos OS devices, a stream of TCP packets sent to the Routing Engine (RE) may cause mbuf leak which can lead to Flexible PIC Concentrator (FPC) crash or the system to crash and restart (vmcore). This issue can be trigged by IPv4 or IPv6 and it is caused only by TCP packets. This issue is not related to any specific configuration and it affects Junos OS releases starting from 17.4R1. However, this issue does not affect Junos OS releases prior to 18.2R1 when Nonstop active routing (NSR) is... • https://kb.juniper.net/JSA11040 • CWE-159: Improper Handling of Invalid Use of Special Elements CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2020-1651 – Junos OS: MX Series: PFE on the line card may crash due to memory leak.
https://notcve.org/view.php?id=CVE-2020-1651
17 Jul 2020 — On Juniper Networks MX series, receipt of a stream of specific Layer 2 frames may cause a memory leak resulting in the packet forwarding engine (PFE) on the line card to crash and restart, causing traffic interruption. By continuously sending this stream of specific layer 2 frame, an attacker connected to the same broadcast domain can repeatedly crash the PFE, causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS on MX Series: 17.2 versions prior to 17.2R3-S4; 17.2X75 ver... • https://kb.juniper.net/JSA11038 • CWE-19: Data Processing Errors CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2020-1650 – Junos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC
https://notcve.org/view.php?id=CVE-2020-1650
17 Jul 2020 — On Juniper Networks Junos MX Series with service card configured, receipt of a stream of specific packets may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending these specific packets, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a prolonged Denial of Service. This issue affects MX Series devices using MS-PIC, MS-MIC or MS-MPC service cards with any service configured. This issue affects Juniper Networks Junos OS on MX Series: 17.2R2-S7; 17.3R3-S4, 17.3R3-S5; 17... • https://kb.juniper.net/JSA11037 •

CVE-2020-1649 – Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reassembly
https://notcve.org/view.php?id=CVE-2020-1649
17 Jul 2020 — When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of small fragments requiring reassembly, generating the following error messages: [LOG: Err] MQSS(2): WO: Packet Error - Error Packets 1, Connection 29 [LOG: Err] eachip_hmcif_rx_intr_handler(7259): EA[2:0]: HMCIF Rx: Injected checksum error detected on WO r... • https://kb.juniper.net/JSA11036 •

CVE-2020-1648 – Junos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet
https://notcve.org/view.php?id=CVE-2020-1648
17 Jul 2020 — On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, prior to 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60... • https://kb.juniper.net/JSA11035 • CWE-159: Improper Handling of Invalid Use of Special Elements CWE-690: Unchecked Return Value to NULL Pointer Dereference •