描述:
Juniper Networks 发布了安全公告,以应对 Junos OS、Junos OS Evolved 及 Junos Space 的多个漏洞。有关漏洞的详细资料,请参阅供应商网站的相应安全公告。
受影响的系统:
- Juniper Networks Junos OS
- Juniper Networks Junos OS Evolved
- Juniper Networks Junos Space
有关受影响系统的详细资料,请参阅供应商网站的相应安全公告。
影响:
成功利用漏洞可以在受影响的系统导致远端执行程式码、服务被拒绝、权限提升、泄漏资讯或绕过保安限制。
建议:
现已有适用于受影响系统的修补程式。受影响系统的系统管理员应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSH
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-On-SRv6-enabled-devices-an-attacker-sending-a-malformed-BGP-update-can-cause-the-rpd-to-crash-CVE-2025-21593
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specially-crafted-BGP-update-packet-causes-RPD-crash-CVE-2025-21602
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-traceoptions-are-configured-receipt-of-malformed-BGP-packets-causes-RPD-to-crash-CVE-2025-21598
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-certain-BGP-options-enabled-receipt-of-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-21600
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specifically-malformed-IPv6-packets-causes-kernel-memory-exhaustion-leading-to-Denial-of-Service-CVE-2025-21599
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-SRX-Series-Low-privileged-user-able-to-access-highly-sensitive-information-on-file-system-CVE-2025-21592
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-OS-SRX1500-SRX4100-SRX4200-Execution-of-low-privileged-CLI-command-results-in-chassisd-crash-CVE-2025-21596
- https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805 (to CVE-2022-24810)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3255
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52801
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1488
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742 (to CVE-2024-25743)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629 (to CVE-2024-26630)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834 (to CVE-2024-28835)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32462
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39894
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40936
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490 (to CVE-2024-45492)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21592 (to CVE-2025-21593)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21596
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21598 (to CVE-2025-21600)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21602