Juniper Vulnerabilities
Comprehensive security vulnerability database for Juniper products
3
0
3
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-36851 | 5.3 | An attacker can exploit a flaw in Juniper's Junos OS to upload and download files without needing to log in, potentially compromising the system's integrity and confidentiality. This vulnerability affects specific versions of the software, allowing unauthorized access if the attacker knows how to make a specific request. | juniperjunos | Exploit Available | over 2 years agoSep 27, 2023 |
| CVE-2023-36847 | 5.3 | An attacker can upload arbitrary files to the Juniper Networks Junos OS on EX Series devices without needing to log in, which can compromise the integrity of the file system. This vulnerability affects multiple versions of the software, so if you're using an outdated version, you should update immediately to prevent exploitation. | juniperjunos | Exploit Available | over 2 years agoAug 17, 2023 |
| CVE-2023-36846 | 5.3 | This vulnerability allows an attacker to upload unauthorized files to the Juniper Networks Junos OS on SRX Series devices without needing to log in, which can compromise the integrity of the file system. It affects multiple versions of the software, so if you're running an outdated version, you could be at risk. | juniperjunos | Exploit Available | over 2 years agoAug 17, 2023 |
About Juniper Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Juniper products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.