Page 80 of 498 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 35EXPL: 0

A buffer overflow vulnerability in Junos OS CLI may allow a local authenticated user with read only privileges and access to Junos CLI, to execute code with root privileges. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D46 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions prior to 14.1X53-D130 on QFabric System; 14.2 versions prior to 14.2R4-S9, 14.2R6; 15.1 versions prior to 15.1F5, 15.1R3; 15.1X49 versions prior to 15.1X49-D40 on SRX Series; 15.1X53 versions prior to 15.1X53-D47 on NFX150, NFX250; 15.1X53 versions prior to 15.1X53-D65 on QFX10000 Series; 15.1X53 versions prior to 15.1X53-D233 on QFX5110, QFX5200. Una vulnerabilidad de desbordamiento de búfer en la CLI de Junos OS puede permitir que un usuario autenticado local con privilegios de solo lectura y acceso a la CLI de Junos ejecute código con privilegios root. Las versiones afectadas son Juniper Networks Junos OS: versión 14.1X53 y versiones anteriores a 14.1X53-D46 en EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; Versiones 14.1X53 anteriores a 14.1X53-D130 en QFabric System; versión 14.2 y versiones anteriores a 14.2R4-S9, 14.2R6; versión 15.1 y versiones anteriores a 15.1F5, 15.1R3; versión 15.1X49 anteriores a 15.1X49-D40 en la serie SRX; versión 15.1X53 anteriores a 15.1X53-D47 en NFX150, NFX250; versión 15.1X53 anteriores a 15.1X53-D65 en la serie QFX10000; versión 15.1X53 anteriores a 15.1X53-D233 en QFX5110, QFX5200. • http://www.securityfocus.com/bid/100323 http://www.securitytracker.com/id/1038900 https://kb.juniper.net/JSA10803 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 21EXPL: 0

The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services authentication API, hardcoded credentials were identified and removed which can impact both the SRX Series device, and potentially LDAP and Active Directory integrated points. An attacker may be able to completely compromise SRX Series devices, as well as Active Directory servers and services. When Active Directory is compromised, it may allow access to user credentials, workstations, servers performing other functions such as email, database, etc. Inter-Forest Active Directory deployments may also be at risk as the attacker may gain full administrative control over one or more Active Directories depending on the credentials supplied by the administrator of the AD domains and SRX devices performing integrated authentication of users, groups and devices. • http://www.securitytracker.com/id/1038904 https://kb.juniper.net/JSA10791 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.5EPSS: 0%CPEs: 37EXPL: 0

The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40 on QFX, EX, QFabric System; 15.1 prior to 15.1F2-S18, 15.1R4 on all products and platforms; 15.1X49 prior to 15.1X49-D80 on SRX; 15.1X53 prior to 15.1X53-D51, 15.1X53-D60 on NFX, QFX, EX. El demonio jdhcpd mejorado de Juniper puede experimentar un uso elevado de la CPU, o bloquearse y reiniciar al recibir un paquete UDP IPv6 no válido. • http://www.securitytracker.com/id/1038899 https://kb.juniper.net/JSA10800 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 prior to 15.1X53-D47, 15.1 prior to 15.1R3. Junos versions prior to 15.1 are not affected. No other Juniper Networks products or platforms are affected by this issue. • http://www.securitytracker.com/id/1038901 https://kb.juniper.net/JSA10805 • CWE-91: XML Injection (aka Blind XPath Injection) •

CVSS: 8.1EPSS: 0%CPEs: 15EXPL: 0

MACsec feature on Juniper Networks Junos OS 15.1X49 prior to 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that are not capable of MACsec or when a secure link can not be established. This can mislead customers into believing that a link is secure. On SRX 300 series devices, prior to 15.1X49-D100, MACsec was only supported on control and fabric ports of SRX340 and SRX345 devices. • http://www.securitytracker.com/id/1038890 https://kb.juniper.net/JSA10790 • CWE-392: Missing Report of Error Condition •