Junos Vulnerabilities

Security vulnerability tracking for Juniper Junos

Last updated: Sep 27, 2023
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Junos

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2023-368515.3

An attacker can exploit a flaw in Juniper's Junos OS to upload and download files without needing to log in, potentially compromising the system's integrity and confidentiality. This vulnerability affects specific versions of the software, allowing unauthorized access if the attacker knows how to make a specific request.

juniperjunos
Exploit Available
over 2 years agoSep 27, 2023
CVE-2023-368475.3

An attacker can upload arbitrary files to the Juniper Networks Junos OS on EX Series devices without needing to log in, which can compromise the integrity of the file system. This vulnerability affects multiple versions of the software, so if you're using an outdated version, you should update immediately to prevent exploitation.

juniperjunos
Exploit Available
over 2 years agoAug 17, 2023
CVE-2023-368465.3

This vulnerability allows an attacker to upload unauthorized files to the Juniper Networks Junos OS on SRX Series devices without needing to log in, which can compromise the integrity of the file system. It affects multiple versions of the software, so if you're running an outdated version, you could be at risk.

juniperjunos
Exploit Available
over 2 years agoAug 17, 2023

About Juniper Junos Security

This page provides comprehensive security vulnerability tracking for Juniper Junos. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Junos updated to the latest version
  • • Subscribe to security advisories from Juniper
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately