Skip to main content

Juniper Junos OS Multiple Vulnerabilities

Release Date: 13 Oct 2023 4966 Views

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

TYPE: Networks OS

Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, security restriction bypass, sensitive information disclosure and data manipulation on the targeted system.


Impact

  • Denial of Service
  • Elevation of Privilege
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Data Manipulation

System / Technologies affected

Juniper Networks Junos OS

  • 18.4 version 18.4R2 and later versions prior to 20.4R3-S8
  • 20.3 versions prior to 20.3R3-S5 on QFX5k
  • 20.4 versions prior to 20.4R3-S5
  • 20.4 versions prior to 20.4R3-S5 on QFX5k
  • 20.4 versions prior to 20.4R3-S9
  • 21.1 version 21.1R1 and later versions
  • 21.1 version 21.1R1 and later versions prior to 21.2R3-S6
  • 21.1 version 21.1R1-EVO and later versions
  • 21.1 versions 21.1R1 and later
  • 21.1 versions 21.1R1-EVO and later
  • 21.1 versions prior to 21.1R3-S2-EVO
  • 21.1 versions prior to 21.1R3-S4
  • 21.1 versions prior to 21.1R3-S4 on QFX5k
  • 21.1 versions prior to 21.1R3-S5
  • 21.1-EVO version 21.1R1 and later versions
  • 21.1-EVO version 21.1R1-EVO and later
  • 21.1-EVO version 21.1R1-EVO and later versions
  • 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO
  • 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S6-EVO
  • 21.2 versions prior to 21.2R3-S2
  • 21.2 versions prior to 21.2R3-S2-EVO
  • 21.2 versions prior to 21.2R3-S3
  • 21.2 versions prior to 21.2R3-S3 on QFX5k
  • 21.2 versions prior to 21.2R3-S4
  • 21.2 versions prior to 21.2R3-S5
  • 21.2 versions prior to 21.2R3-S5-EVO
  • 21.2 versions prior to 21.2R3-S6
  • 21.2 versions prior to 21.2R3-S6-EVO
  • 21.2-EVO version 21.2R1 and later versions
  • 21.2-EVO versions prior to 21.2R3-S2-EVO
  • 21.2-EVO versions prior to 21.2R3-S6-EVO
  • 21.3 versions prior to 21.3R2-S2, 21.3R3-S1
  • 21.3 versions prior to 21.3R3
  • 21.3 versions prior to 21.3R3-S1-EVO
  • 21.3 versions prior to 21.3R3-S2 on QFX5k
  • 21.3 versions prior to 21.3R3-S3
  • 21.3 versions prior to 21.3R3-S4
  • 21.3 versions prior to 21.3R3-S4-EVO
  • 21.3 versions prior to 21.3R3-S5
  • 21.3 versions prior to 21.3R3-S5-EVO
  • 21.3-EVO version 21.3R1-EVO and later
  • 21.3-EVO version 21.3R1-EVO and later versions
  • 21.3-EVO versions prior to 21.3R3-S2-EVO
  • 21.3-EVO versions prior to 21.3R3-S3-EVO
  • 21.3-EVO versions prior to 21.3R3-S5-EVO
  • 21.4 versions prior to 21.4R2-S1, 21.4R3
  • 21.4 versions prior to 21.4R2-S1, 21.4R3-S5
  • 21.4 versions prior to 21.4R2-S2, 21.4R3
  • 21.4 versions prior to 21.4R2-S2-EVO
  • 21.4 versions prior to 21.4R3
  • 21.4 versions prior to 21.4R3 on QFX5k
  • 21.4 versions prior to 21.4R3-S1
  • 21.4 versions prior to 21.4R3-S2
  • 21.4 versions prior to 21.4R3-S3
  • 21.4 versions prior to 21.4R3-S3-EVO
  • 21.4 versions prior to 21.4R3-S4
  • 21.4 versions prior to 21.4R3-S4-EVO
  • 21.4 versions prior to 21.4R3-S5
  • 21.4 versions prior to 21.4R3-S5-EVO
  • 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO
  • 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-S5-EVO
  • 21.4-EVO versions prior to 21.4R3-S3-EVO
  • 21.4-EVO versions prior to 21.4R3-S4-EVO
  • 22.1 versions prior to 22.1R1-S2, 22.1R2
  • 22.1 versions prior to 22.1R2-S2, 22.1R3
  • 22.1 versions prior to 22.1R3
  • 22.1 versions prior to 22.1R3 on QFX5k
  • 22.1 versions prior to 22.1R3-S1
  • 22.1 versions prior to 22.1R3-S2
  • 22.1 versions prior to 22.1R3-S2-EVO
  • 22.1 versions prior to 22.1R3-S3
  • 22.1 versions prior to 22.1R3-S3-EVO
  • 22.1 versions prior to 22.1R3-S4
  • 22.1 versions prior to 22.1R3-S4-EVO
  • 22.1-EVO version 22.1R1-EVO and later
  • 22.1-EVO version 22.1R1-EVO and later versions prior to 22.2R2-S2-EVO, 22.2R3-EVO
  • 22.1-EVO versions prior to 22.1R3-EVO
  • 22.1-EVO versions prior to 22.1R3-S3-EVO
  • 22.1-EVO versions prior to 22.1R3-S4-EVO
  • 22.2 versions 22.2R1-EVO and later
  • 22.2 versions prior to 22.2R1-S1, 22.2R2
  • 22.2 versions prior to 22.2R2
  • 22.2 versions prior to 22.2R2 on QFX5k
  • 22.2 versions prior to 22.2R2-EVO
  • 22.2 versions prior to 22.2R2-S1, 22.2R3
  • 22.2 versions prior to 22.2R2-S2, 22.2R3
  • 22.2 versions prior to 22.2R3
  • 22.2 versions prior to 22.2R3-EVO
  • 22.2 versions prior to 22.2R3-S1
  • 22.2 versions prior to 22.2R3-S1-EVO
  • 22.2 versions prior to 22.2R3-S2
  • 22.2 versions prior to 22.2R3-S2-EVO
  • 22.2 versions prior to 22.2R3-S3-EVO
  • 22.2-EVO version 22.2R1-EVO and later
  • 22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO
  • 22.2-EVO versions prior to 22.2R3-S2-EVO
  • 22.2-EVO versions prior to 22.2R3-S3-EVO
  • 22.3 versions prior to 22.3R1-S2, 22.3R2
  • 22.3 versions prior to 22.3R1-S2, 22.3R2.
  • 22.3 versions prior to 22.3R2
  • 22.3 versions prior to 22.3R2-S1, 22.3R3
  • 22.3 versions prior to 22.3R2-S1, 22.3R3-S1
  • 22.3 versions prior to 22.3R2-S2
  • 22.3 versions prior to 22.3R2-S2, 22.3R3
  • 22.3 versions prior to 22.3R2-S2, 22.3R3-S1
  • 22.3 versions prior to 22.3R2-S2-EVO
  • 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO
  • 22.3 versions prior to 22.3R3
  • 22.3 versions prior to 22.3R3-EVO
  • 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO
  • 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO
  • 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO
  • 22.4 versions prior to 22.4R1-S1-EVO
  • 22.4 versions prior to 22.4R1-S2, 22.4R2
  • 22.4 versions prior to 22.4R2
  • 22.4 versions prior to 22.4R2-EVO
  • 22.4 versions prior to 22.4R2-EVO.
  • 22.4 versions prior to 22.4R2-S1, 22.4R3
  • 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO
  • 22.4 versions prior to 22.4R2-S2, 22.4R3
  • 22.4 versions prior to 22.4R3
  • 22.4 versions prior to 22.4R3-EVO
  • 22.4-EVO versions prior to 22.4R2-EVO
  • 22.4-EVO versions prior to 22.4R2-S1-EVO, 22.4R3-EVO
  • 22.4-EVO versions prior to 22.4R3-EVO
  • 23.1 versions prior to 23.1R2
  • 23.2 versions prior to 23.2R1, 23.2R2
  • 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO
  • 23.2 versions prior to 23.2R2
  • 23.2 versions prior to 23.2R2-EVO
  • 23.2-EVO versions prior to 23.2R1-EVO
  • All versions prior to 20.2R3-S6 on QFX5k
  • All versions prior to 20.4R3-S4
  • All versions prior to 20.4R3-S4-EVO
  • All versions prior to 20.4R3-S5
  • All versions prior to 20.4R3-S6
  • All versions prior to 20.4R3-S6-EVO
  • All versions prior to 20.4R3-S7
  • All versions prior to 20.4R3-S7-EVO
  • All versions prior to 20.4R3-S8
  • All versions prior to 20.4R3-S8, 20.4R3-S9
  • All versions prior to 20.4R3-S8-EVO
  • All versions prior to 21.4R3-S3-EVO
  • All versions prior to 21.4R3-S4-EVO
  • All versions prior to 21.4R3-S5-EVO
  • All versions prior to 22.3R3-EVO

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor. For detail, please refer to the link below:

 


Vulnerability Identifier


Source


Related Link