Juniper Junos OS 多個漏洞
發佈日期:
2025年01月10日
181
觀看次數
風險: 中度風險
類型: 操作系統 - Network
於 Juniper Junos OS 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料、遠端執行程式碼、權限提升及繞過保安限制。
影響
- 阻斷服務
- 資料洩露
- 繞過保安限制
- 遠端執行程式碼
- 權限提升
受影響之系統或技術
- Junos OS
- Junos OS Evolved
詳情請參閱以下連結﹕
解決方案
在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。
請參閱 2025-01 安全公告。
漏洞識別碼
- CVE-2016-2183
- CVE-2020-11022
- CVE-2022-24805
- CVE-2022-24806
- CVE-2022-24807
- CVE-2022-24808
- CVE-2022-24809
- CVE-2022-24810
- CVE-2023-3019
- CVE-2023-3255
- CVE-2023-4408
- CVE-2023-5088
- CVE-2023-5517
- CVE-2023-5679
- CVE-2023-6240
- CVE-2023-6516
- CVE-2023-6683
- CVE-2023-7008
- CVE-2023-42467
- CVE-2023-50387
- CVE-2023-50868
- CVE-2023-52463
- CVE-2023-52801
- CVE-2024-1488
- CVE-2024-6119
- CVE-2024-25742
- CVE-2024-25743
- CVE-2024-26629
- CVE-2024-26630
- CVE-2024-26720
- CVE-2024-26886
- CVE-2024-26946
- CVE-2024-28834
- CVE-2024-28835
- CVE-2024-32462
- CVE-2024-35791
- CVE-2024-35797
- CVE-2024-35875
- CVE-2024-36000
- CVE-2024-36019
- CVE-2024-36883
- CVE-2024-36979
- CVE-2024-38559
- CVE-2024-38619
- CVE-2024-39532
- CVE-2024-40927
- CVE-2024-40936
- CVE-2024-41040
- CVE-2024-41044
- CVE-2024-41055
- CVE-2024-41073
- CVE-2024-41096
- CVE-2024-42082
- CVE-2024-42096
- CVE-2024-42102
- CVE-2024-42131
- CVE-2024-45490
- CVE-2024-45491
- CVE-2024-45492
- CVE-2025-21592
- CVE-2025-21593
- CVE-2025-21596
- CVE-2025-21598
- CVE-2025-21599
- CVE-2025-21600
- CVE-2025-21602
資料來源
相關連結
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-On-SRv6-enabled-devices-an-attacker-sending-a-malformed-BGP-update-can-cause-the-rpd-to-crash-CVE-2025-21593?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-SRX-Series-Low-privileged-user-able-to-access-highly-sensitive-information-on-file-system-CVE-2025-21592?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specially-crafted-BGP-update-packet-causes-RPD-crash-CVE-2025-21602?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-certain-BGP-options-enabled-receipt-of-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-21600?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-traceoptions-are-configured-receipt-of-malformed-BGP-packets-causes-RPD-to-crash-CVE-2025-21598?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-SRX1500-SRX4100-SRX4200-Execution-of-low-privileged-CLI-command-results-in-chassisd-crash-CVE-2025-21596?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSH?language=en_US
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specifically-malformed-IPv6-packets-causes-kernel-memory-exhaustion-leading-to-Denial-of-Service-CVE-2025-21599?language=en_US
分享至