Page 42 of 270 results (0.005 seconds)

CVSS: 9.9EPSS: 0%CPEs: 35EXPL: 0

A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 prior to 12.1X44-D60; 12.1X46 prior to 12.1X46-D50; 12.1X47 prior to 12.1X47-D30, 12.1X47-D35; 12.3X48 prior to 12.3X48-D20, 12.3X48-D30; 15.1X49 prior to 15.1X49-D20, 15.1X49-D30. Una vulnerabilidad de inyección de comandos en la función IDP de Juniper Networks Junos OS en dispositivos de la serie SRX potencialmente permite a un usuario con acceso de inicio de sesión al dispositivo ejecutar comandos shell y elevar privilegios. Las versiones afectadas son Juniper Networks Junos OS versión 12.1X44 anterior a 12.1X44-D60; versión 12.1X46 anterior a 12.1X46-D50; versión 12.1X47 anterior a 12.1X47-D30, 12.1X47-D35; versión 12.3X48 anterior a 12.3X48-D20, 12.3X48-D30; versión 15.1X49 anterior a 15.1X49-D20, 15.1X49-D30. • http://www.securitytracker.com/id/1038898 https://kb.juniper.net/JSA10801 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.3EPSS: 0%CPEs: 34EXPL: 0

When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out. Administrators can confirm if the root account is locked out via the following command root@device> show system login lockout user root User Lockout start Lockout end root 1995-01-01 01:00:01 PDT 1995-11-01 01:31:01 PDT Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D65 on SRX series; 12.3X48 prior to 12.3X48-D45 on SRX series; 15.1X49 prior to 15.1X49-D75 on SRX series. Cuando el dispositivo está configurado para realizar el bloqueo de la cuenta con un período de tiempo definido, cualquier usuario no autenticado que intente iniciar sesión como root con una contraseña incorrecta puede desencadenar un bloqueo de la cuenta root. Cuando un dispositivo de la serie SRX está en modo clúster y se produce una operación de sincronización o conmutación por error del clúster, entonces habrá errores asociados con la sincronización o la conmutación por error mientras la cuenta root está bloqueada. • http://www.securitytracker.com/id/1038886 https://kb.juniper.net/JSA10806 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 8.6EPSS: 0%CPEs: 47EXPL: 0

On all vSRX and SRX Series devices, when the DHCP or DHCP relay is configured, specially crafted packet might cause the flowd process to crash, halting or interrupting traffic from flowing through the device(s). Repeated crashes of the flowd process may constitute an extended denial of service condition for the device(s). If the device is configured in high-availability, the RG1+ (data-plane) will fail-over to the secondary node. If the device is configured in stand-alone, there will be temporary traffic interruption until the flowd process is restored automatically. Sustained crafted packets may cause the secondary failover node to fail back, or fail completely, potentially halting flowd on both nodes of the cluster or causing flip-flop failovers to occur. • http://www.securitytracker.com/id/1038891 https://kb.juniper.net/JSA10789 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 9%CPEs: 137EXPL: 0

On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial denial of service condition. Additionally, it may be possible to craft a malicious SNMP packet in a way that can result in remote code execution. SNMP is disabled in Junos OS by default. Junos OS devices with SNMP disabled are not affected by this issue. • http://www.securityfocus.com/bid/99567 http://www.securitytracker.com/id/1038903 https://kb.juniper.net/JSA10793 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 75EXPL: 0

Receipt of a malformed BGP OPEN message may cause the routing protocol daemon (rpd) process to crash and restart. By continuously sending specially crafted BGP OPEN messages, an attacker can repeatedly crash the rpd process causing prolonged denial of service. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 12.3 prior to 12.3R12-S4, 12.3R13, 12.3R3-S4; 12.3X48 prior to 12.3X48-D50; 13.3 prior to 13.3R4-S11, 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior to 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R4-S7, 14.2R6-S4, 14.2R7; 15.1 prior to 15.1F2-S11, 15.1F4-S1-J1, 15.1F5-S3, 15.1F6, 15.1R4; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D33, 15.1X53-D50. La recepción de un mensaje BGP OPEN malformado puede causar que el proceso routing protocol daemon (rpd) se bloquee y reinicie. • http://www.securitytracker.com/id/1038889 https://kb.juniper.net/JSA10779 • CWE-20: Improper Input Validation •