3
0
3
0
Vulnerability Timeline
3 vulnerabilities discovered over time for Junos
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-36851 | 5.3 | An attacker can exploit a flaw in Juniper's Junos OS to upload and download files without needing to log in, potentially compromising the system's integrity and confidentiality. This vulnerability affects specific versions of the software, allowing unauthorized access if the attacker knows how to make a specific request. | juniperjunos | Exploit Available | over 2 years agoSep 27, 2023 |
| CVE-2023-36847 | 5.3 | An attacker can upload arbitrary files to the Juniper Networks Junos OS on EX Series devices without needing to log in, which can compromise the integrity of the file system. This vulnerability affects multiple versions of the software, so if you're using an outdated version, you should update immediately to prevent exploitation. | juniperjunos | Exploit Available | over 2 years agoAug 17, 2023 |
| CVE-2023-36846 | 5.3 | This vulnerability allows an attacker to upload unauthorized files to the Juniper Networks Junos OS on SRX Series devices without needing to log in, which can compromise the integrity of the file system. It affects multiple versions of the software, so if you're running an outdated version, you could be at risk. | juniperjunos | Exploit Available | over 2 years agoAug 17, 2023 |
About Juniper Junos Security
This page provides comprehensive security vulnerability tracking for Juniper Junos. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Junos updated to the latest version
- • Subscribe to security advisories from Juniper
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately