Refine your search
3 vulnerabilities found for Session Smart Router by Juniper Networks
CERTFR-2025-AVI-0126
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Juniper Networks. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | Session Smart Conductor | Session Smart Conductor versions 6.2.x antérieures à 6.2.8-lts | ||
Juniper Networks | Session Smart Router | Session Smart Router versions 6.3.x antérieures à 6.3.3-r2 | ||
Juniper Networks | WAN Assurance Managed Routers | WAN Assurance Managed Routers versions 6.2.x antérieures à 6.2.8-lts | ||
Juniper Networks | Session Smart Router | Session Smart Router versions 6.x antérieures à 6.1.12-lts | ||
Juniper Networks | WAN Assurance Managed Routers | WAN Assurance Managed Routers versions 6.x antérieures à 6.1.12-lts | ||
Juniper Networks | Session Smart Router | Session Smart Router versions 5.6.x antérieures à 5.6.17 | ||
Juniper Networks | Session Smart Conductor | Session Smart Conductor versions 5.6.x antérieures à 5.6.17 | ||
Juniper Networks | Session Smart Conductor | Session Smart Conductor versions 6.x antérieures à 6.1.12-lts | ||
Juniper Networks | Session Smart Conductor | Session Smart Conductor versions 6.3.x antérieures à 6.3.3-r2 | ||
Juniper Networks | WAN Assurance Managed Routers | WAN Assurance Managed Routers versions 6.3.x antérieures à 6.3.3-r2 | ||
Juniper Networks | WAN Assurance Managed Routers | WAN Assurance Managed Routers versions 5.6.x antérieures à 5.6.17 | ||
Juniper Networks | Session Smart Router | Session Smart Router versions 6.2.x antérieures à 6.2.8-lts |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Session Smart Conductor versions 6.2.x ant\u00e9rieures \u00e0 6.2.8-lts", "product": { "name": "Session Smart Conductor", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-r2", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "WAN Assurance Managed Routers versions 6.2.x ant\u00e9rieures \u00e0 6.2.8-lts", "product": { "name": "WAN Assurance Managed Routers", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions 6.x ant\u00e9rieures \u00e0 6.1.12-lts", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "WAN Assurance Managed Routers versions 6.x ant\u00e9rieures \u00e0 6.1.12-lts", "product": { "name": "WAN Assurance Managed Routers", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions 5.6.x ant\u00e9rieures \u00e0 5.6.17", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Conductor versions 5.6.x ant\u00e9rieures \u00e0 5.6.17", "product": { "name": "Session Smart Conductor", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Conductor versions 6.x ant\u00e9rieures \u00e0 6.1.12-lts", "product": { "name": "Session Smart Conductor", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Conductor versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-r2", "product": { "name": "Session Smart Conductor", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "WAN Assurance Managed Routers versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-r2", "product": { "name": "WAN Assurance Managed Routers", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "WAN Assurance Managed Routers versions 5.6.x ant\u00e9rieures \u00e0 5.6.17", "product": { "name": "WAN Assurance Managed Routers", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions 6.2.x ant\u00e9rieures \u00e0 6.2.8-lts", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-21589", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21589" } ], "initial_release_date": "2025-02-12T00:00:00", "last_revision_date": "2025-02-12T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0126", "revisions": [ { "description": "Version initiale", "revision_date": "2025-02-12T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Juniper Networks. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.", "title": "Vuln\u00e9rabilit\u00e9 dans les produits Juniper Networks", "vendor_advisories": [ { "published_at": "2025-02-11", "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA94663", "url": "https://supportportal.juniper.net/s/article/2025-02-Out-of-Cycle-Security-Bulletin-Session-Smart-Router-Session-Smart-Conductor-WAN-Assurance-Router-API-Authentication-Bypass-Vulnerability-CVE-2025-21589" } ] }
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-3707", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3707" }, { "name": "CVE-2024-21602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21602" }, { "name": "CVE-2022-41974", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41974" }, { "name": "CVE-2023-38802", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38802" }, { "name": "CVE-2023-21938", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938" }, { "name": "CVE-2023-21843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843" }, { "name": "CVE-2022-42720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42720" }, { "name": "CVE-2022-30594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30594" }, { "name": "CVE-2022-41973", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41973" }, { "name": "CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "name": "CVE-2024-21616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21616" }, { "name": "CVE-2021-25220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220" }, { "name": "CVE-2023-2235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2235" }, { "name": "CVE-2023-23454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23454" }, { "name": "CVE-2023-21954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21954" }, { "name": "CVE-2022-2964", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2964" }, { "name": "CVE-2023-21939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939" }, { "name": "CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "name": "CVE-2024-21599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21599" }, { "name": "CVE-2022-47929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929" }, { "name": "CVE-2022-3628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3628" }, { "name": "CVE-2024-21614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21614" }, { "name": "CVE-2023-21830", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-26464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26464" }, { "name": "CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "name": "CVE-2021-26691", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691" }, { "name": "CVE-2022-4269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4269" }, { "name": "CVE-2022-42703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42703" }, { "name": "CVE-2024-21607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21607" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-32067", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067" }, { "name": "CVE-2023-0266", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0266" }, { "name": "CVE-2019-17571", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17571" }, { "name": "CVE-2022-39189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189" }, { "name": "CVE-2022-3239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3239" }, { "name": "CVE-2022-43750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750" }, { "name": "CVE-2022-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3567" }, { "name": "CVE-2023-2828", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2828" }, { "name": "CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "name": "CVE-2023-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081" }, { "name": "CVE-2023-20569", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20569" }, { "name": "CVE-2024-21596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21596" }, { "name": "CVE-2022-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564" }, { "name": "CVE-2021-33656", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33656" }, { "name": "CVE-2023-1582", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1582" }, { "name": "CVE-2022-4129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4129" }, { "name": "CVE-2022-41218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41218" }, { "name": "CVE-2023-2194", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2194" }, { "name": "CVE-2024-21604", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21604" }, { "name": "CVE-2023-32360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32360" }, { "name": "CVE-2022-0934", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0934" }, { "name": "CVE-2020-9493", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9493" }, { "name": "CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "name": "CVE-2022-2196", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2196" }, { "name": "CVE-2021-39275", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275" }, { "name": "CVE-2022-42896", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42896" }, { "name": "CVE-2022-21699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21699" }, { "name": "CVE-2024-21600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21600" }, { "name": "CVE-2021-33655", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33655" }, { "name": "CVE-2023-0767", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767" }, { "name": "CVE-2022-1462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1462" }, { "name": "CVE-2023-23920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23920" }, { "name": "CVE-2023-20593", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20593" }, { "name": "CVE-2024-21606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21606" }, { "name": "CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "name": "CVE-2022-41222", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41222" }, { "name": "CVE-2016-10009", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10009" }, { "name": "CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "name": "CVE-2022-2663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663" }, { "name": "CVE-2023-23918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23918" }, { "name": "CVE-2024-21591", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21591" }, { "name": "CVE-2020-12321", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12321" }, { "name": "CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "name": "CVE-2022-3524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524" }, { "name": "CVE-2022-39188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188" }, { "name": "CVE-2023-3341", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3341" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2022-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795" }, { "name": "CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "name": "CVE-2022-43945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43945" }, { "name": "CVE-2022-3625", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3625" }, { "name": "CVE-2021-34798", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798" }, { "name": "CVE-2024-21587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21587" }, { "name": "CVE-2022-42721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42721" }, { "name": "CVE-2022-4378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4378" }, { "name": "CVE-2022-4254", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4254" }, { "name": "CVE-2024-21617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21617" }, { "name": "CVE-2023-1195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1195" }, { "name": "CVE-2024-21589", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21589" }, { "name": "CVE-2023-21937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937" }, { "name": "CVE-2023-22809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22809" }, { "name": "CVE-2022-20141", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20141" }, { "name": "CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2024-21595", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21595" }, { "name": "CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "name": "CVE-2021-3621", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621" }, { "name": "CVE-2023-0394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394" }, { "name": "CVE-2022-22164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22164" }, { "name": "CVE-2024-21597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21597" }, { "name": "CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "name": "CVE-2023-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0386" }, { "name": "CVE-2016-2183", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183" }, { "name": "CVE-2021-26341", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26341" }, { "name": "CVE-2022-38023", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38023" }, { "name": "CVE-2023-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22045" }, { "name": "CVE-2022-1679", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1679" }, { "name": "CVE-2023-22049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22049" }, { "name": "CVE-2023-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408" }, { "name": "CVE-2022-3619", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619" }, { "name": "CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "name": "CVE-2023-1829", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1829" }, { "name": "CVE-2022-25265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25265" }, { "name": "CVE-2022-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1789" }, { "name": "CVE-2022-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2873" }, { "name": "CVE-2022-3623", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623" }, { "name": "CVE-2024-21611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21611" }, { "name": "CVE-2024-21613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21613" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2023-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968" }, { "name": "CVE-2024-21612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21612" }, { "name": "CVE-2022-42722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42722" }, { "name": "CVE-2024-21603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21603" }, { "name": "CVE-2023-21930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930" }, { "name": "CVE-2024-21585", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21585" }, { "name": "CVE-2022-23302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23302" }, { "name": "CVE-2023-24329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329" }, { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "name": "CVE-2023-36842", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36842" }, { "name": "CVE-2022-4139", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4139" }, { "name": "CVE-2024-21594", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21594" }, { "name": "CVE-2022-3028", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3028" }, { "name": "CVE-2022-3566", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3566" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-21967", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967" }, { "name": "CVE-2022-41674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41674" }, { "name": "CVE-2024-21601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21601" }, { "name": "CVE-2023-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124" }, { "name": "CVE-2020-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465" } ], "initial_release_date": "2024-01-11T00:00:00", "last_revision_date": "2024-01-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0027", "revisions": [ { "description": "Version initiale", "revision_date": "2024-01-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591" } ] }
CERTFR-2022-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1", "product": { "name": "Junos Space", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": "", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-1343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343" }, { "name": "CVE-2022-22243", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22243" }, { "name": "CVE-2022-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473" }, { "name": "CVE-2020-25710", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25710" }, { "name": "CVE-2021-45960", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960" }, { "name": "CVE-2022-24407", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407" }, { "name": "CVE-2021-35586", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586" }, { "name": "CVE-2022-22238", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22238" }, { "name": "CVE-2022-22249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22249" }, { "name": "CVE-2021-35550", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550" }, { "name": "CVE-2022-22227", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22227" }, { "name": "CVE-2016-0701", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0701" }, { "name": "CVE-2021-25220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220" }, { "name": "CVE-2021-35567", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567" }, { "name": "CVE-2021-31535", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535" }, { "name": "CVE-2021-42574", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574" }, { "name": "CVE-2020-27777", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777" }, { "name": "CVE-2022-22208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22208" }, { "name": "CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "name": "CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "name": "CVE-2022-22218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22218" }, { "name": "CVE-2021-20271", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20271" }, { "name": "CVE-2022-22823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823" }, { "name": "CVE-2022-22201", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22201" }, { "name": "CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "name": "CVE-2021-42771", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42771" }, { "name": "CVE-2021-29154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154" }, { "name": "CVE-2018-20532", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20532" }, { "name": "CVE-2022-22246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22246" }, { "name": "CVE-2007-6755", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755" }, { "name": "CVE-2020-29661", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "name": "CVE-2022-22250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22250" }, { "name": "CVE-2022-22192", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22192" }, { "name": "CVE-2019-12735", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12735" }, { "name": "CVE-2022-22239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22239" }, { "name": "CVE-2022-25315", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315" }, { "name": "CVE-2022-22822", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822" }, { "name": "CVE-2022-22241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22241" }, { "name": "CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "name": "CVE-2019-2435", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2435" }, { "name": "CVE-2021-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363" }, { "name": "CVE-2022-22226", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22226" }, { "name": "CVE-2015-9262", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262" }, { "name": "CVE-2021-4160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4160" }, { "name": "CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "name": "CVE-2021-35559", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559" }, { "name": "CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "name": "CVE-2019-19532", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532" }, { "name": "CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "name": "CVE-2021-27364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364" }, { "name": "CVE-2021-35565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565" }, { "name": "CVE-2022-22229", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22229" }, { "name": "CVE-2018-20534", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20534" }, { "name": "CVE-2016-4658", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658" }, { "name": "CVE-2021-35603", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603" }, { "name": "CVE-2021-28165", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165" }, { "name": "CVE-2022-23852", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852" }, { "name": "CVE-2022-22225", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22225" }, { "name": "CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "name": "CVE-2022-22825", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825" }, { "name": "CVE-2021-3711", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711" }, { "name": "CVE-2022-22245", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22245" }, { "name": "CVE-2022-25314", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314" }, { "name": "CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "name": "CVE-2022-23990", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990" }, { "name": "CVE-2019-1543", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543" }, { "name": "CVE-2018-10689", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10689" }, { "name": "CVE-2016-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2124" }, { "name": "CVE-2021-27365", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365" }, { "name": "CVE-2020-8648", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648" }, { "name": "CVE-2022-25235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235" }, { "name": "CVE-2020-27170", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170" }, { "name": "CVE-2020-25705", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705" }, { "name": "CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "name": "CVE-2022-0847", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847" }, { "name": "CVE-2020-14385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385" }, { "name": "CVE-2022-22232", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22232" }, { "name": "CVE-2019-18282", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282" }, { "name": "CVE-2020-12321", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12321" }, { "name": "CVE-2022-22240", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22240" }, { "name": "CVE-2021-46143", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143" }, { "name": "CVE-2019-20811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811" }, { "name": "CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "name": "CVE-2021-43527", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527" }, { "name": "CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "name": "CVE-2021-3656", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656" }, { "name": "CVE-2021-35588", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35588" }, { "name": "CVE-2022-22234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22234" }, { "name": "CVE-2022-22242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22242" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2021-22543", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543" }, { "name": "CVE-2022-22251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22251" }, { "name": "CVE-2008-5161", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5161" }, { "name": "CVE-2022-22244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22244" }, { "name": "CVE-2019-20934", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934" }, { "name": "CVE-2021-29650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650" }, { "name": "CVE-2021-3715", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715" }, { "name": "CVE-2022-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22233" }, { "name": "CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "name": "CVE-2021-45417", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417" }, { "name": "CVE-2020-10769", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10769" }, { "name": "CVE-2018-20533", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20533" }, { "name": "CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "name": "CVE-2020-25656", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25656" }, { "name": "CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "name": "CVE-2022-22224", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22224" }, { "name": "CVE-2021-20265", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265" }, { "name": "CVE-2021-3177", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177" }, { "name": "CVE-2020-25211", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25211" }, { "name": "CVE-2022-0492", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492" }, { "name": "CVE-2022-22827", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827" }, { "name": "CVE-2022-22247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22247" }, { "name": "CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "name": "CVE-2019-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205" }, { "name": "CVE-2021-22555", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555" }, { "name": "CVE-2021-3347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347" }, { "name": "CVE-2022-25236", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236" }, { "name": "CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "name": "CVE-2021-37576", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576" }, { "name": "CVE-2021-35578", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578" }, { "name": "CVE-2020-28374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374" }, { "name": "CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "name": "CVE-2022-22199", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22199" }, { "name": "CVE-2021-42550", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550" }, { "name": "CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "name": "CVE-2022-22236", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22236" }, { "name": "CVE-2020-7053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053" }, { "name": "CVE-2022-22248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22248" }, { "name": "CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "name": "CVE-2022-22220", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22220" }, { "name": "CVE-2021-32399", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399" }, { "name": "CVE-2021-35564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564" }, { "name": "CVE-2022-22826", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826" }, { "name": "CVE-2022-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22228" }, { "name": "CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "name": "CVE-2020-14351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14351" }, { "name": "CVE-2020-25709", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25709" }, { "name": "CVE-2022-1434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434" }, { "name": "CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "name": "CVE-2022-22223", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22223" }, { "name": "CVE-2020-25645", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25645" }, { "name": "CVE-2021-35556", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556" }, { "name": "CVE-2020-25717", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717" }, { "name": "CVE-2021-3765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765" }, { "name": "CVE-2021-41617", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617" }, { "name": "CVE-2021-4034", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034" }, { "name": "CVE-2022-24903", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903" }, { "name": "CVE-2022-22824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824" }, { "name": "CVE-2019-1551", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551" }, { "name": "CVE-2019-2684", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2684" }, { "name": "CVE-2021-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0543" }, { "name": "CVE-2021-3653", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653" }, { "name": "CVE-2022-22231", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22231" }, { "name": "CVE-2021-35561", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561" }, { "name": "CVE-2022-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22235" }, { "name": "CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "name": "CVE-2020-28469", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469" }, { "name": "CVE-2022-22211", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22211" }, { "name": "CVE-2020-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465" }, { "name": "CVE-2022-22230", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22230" }, { "name": "CVE-2022-22237", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22237" }, { "name": "CVE-2021-37750", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37750" } ], "initial_release_date": "2022-10-13T00:00:00", "last_revision_date": "2022-10-13T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-916", "revisions": [ { "description": "Version initiale", "revision_date": "2022-10-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211" }, { "published_at": "2022-10-12", "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229" } ] }