9VSA23-00773-01 CSIRT comparte vulnerabilidades en varios productos de Juniper Networks

Resumen

El CSIRT de Gobierno comparte información sobre vulnerabilidades que afectan a varios productos de Juniper Networks.

Vulnerabilidades

CVE-2019-17571

CVE-2020-8492

CVE-2020-14343

CVE-2020-12049

CVE-2020-14583

CVE-2020-14593

CVE-2020-27223

CVE-2021-21309

CVE-2022-22184

CVE-2007-6755

CVE-2019-1543

CVE-2019-1551

CVE-2023-22397

CVE-2020-28469

CVE-2021-23840

CVE-2021-3712

CVE-2021-3765

CVE-2023-22403

CVE-2023-22407

CVE-2023-22409

CVE-2021-3156

CVE-2020-14145

CVE-2020-14871

CVE-2023-22408

CVE-2023-22406

CVE-2023-22399

CVE-2019-11287

CVE-2023-22398

CVE-2022-0778

CVE-2023-22416

CVE-2023-22401

CVE-2023-22415

CVE-2023-22412

CVE-2023-22394

CVE-2023-22393

CVE-2023-22391

CVE-2023-22414

CVE-2023-22411

CVE-2023-22396

CVE-2023-22405

CVE-2023-22400

CVE-2023-22410

CVE-2023-22404

CVE-2023-22395

CVE-2023-22417

CVE-2023-22402

CVE-2023-22413

CVE-2022-22822

CVE-2022-22823

CVE-2022-22824

CVE-2022-23852

CVE-2022-25235

CVE-2022-25236

CVE-2022-25315

CVE-2021-3177

CVE-2021-39275

CVE-2021-44790

CVE-2022-22720

CVE-2022-2526

CVE-2021-26691

CVE-2016-4658

CVE-2021-40438

CVE-2022-22825

CVE-2022-22826

CVE-2022-22827

CVE-2021-3621

CVE-2021-45960

CVE-2022-1271

CVE-2020-24489

CVE-2021-30465

CVE-2020-14583

CVE-2021-42574

CVE-2022-24903

CVE-2021-46143

CVE-2020-36385

CVE-2021-37576

CVE-2020-0466

CVE-2022-0330

CVE-2020-12362

CVE-2021-22555

CVE-2021-29154

CVE-2021-33033

CVE-2021-33034

CVE-2021-3347

CVE-2021-33909

CVE-2021-3715

CVE-2021-4034

CVE-2021-4028

CVE-2021-27365

CVE-2022-0492

CVE-2021-22543

CVE-2021-34798

CVE-2020-27827

CVE-2020-35498

CVE-2018-25032

CVE-2021-23840

CVE-2021-27219

CVE-2022-0778

CVE-2022-38177

CVE-2022-38178

CVE-2022-21449

CVE-2022-34169

CVE-2022-21476

CVE-2021-2388

CVE-2020-14593

CVE-2022-29154

CVE-2021-3712

CVE-2021-25217

CVE-2020-26116

CVE-2020-8648

CVE-2021-27364

CVE-2021-3752

CVE-2021-32399

CVE-2022-1729

CVE-2021-4083

CVE-2020-0465

CVE-2021-35567

CVE-2021-42739

CVE-2020-26137

CVE-2021-40085

CVE-2020-24511

CVE-2020-24513

CVE-2021-0920

CVE-2021-3573

CVE-2021-23841

CVE-2022-21541

CVE-2021-2161

CVE-2021-35550

CVE-2020-11668

CVE-2021-3564

CVE-2020-12363

CVE-2020-12364

CVE-2021-29650

CVE-2020-25704

CVE-2020-36322

CVE-2020-0543

CVE-2020-0548

CVE-2020-0549

CVE-2020-8695

CVE-2020-8696

CVE-2020-8698

CVE-2021-4155

CVE-2022-21123

CVE-2022-21125

CVE-2022-21166

CVE-2021-3504

CVE-2020-14562

CVE-2022-21426

CVE-2021-35556

CVE-2021-35559

CVE-2021-35561

CVE-2021-35565

CVE-2021-35578

CVE-2021-35586

CVE-2022-21277

CVE-2022-21283

CVE-2022-21293

CVE-2022-21294

CVE-2022-21299

CVE-2022-21340

CVE-2022-21341

CVE-2022-21349

CVE-2022-21360

CVE-2022-21365

CVE-2022-21366

CVE-2020-14621

CVE-2022-21434

CVE-2022-21496

CVE-2022-21549

CVE-2021-35564

CVE-2022-21291

CVE-2022-21305

CVE-2022-21540

CVE-2020-14803

CVE-2022-21282

CVE-2022-21296

CVE-2021-2163

CVE-2019-20934

CVE-2020-14556

CVE-2020-27170

CVE-2021-27363

CVE-2021-2369

CVE-2020-14792

CVE-2020-14578

CVE-2020-14579

CVE-2021-2432

CVE-2022-21443

CVE-2020-14779

CVE-2020-14573

CVE-2020-14782

CVE-2020-14797

CVE-2022-21248

CVE-2020-14577

CVE-2020-14581

CVE-2021-35603

CVE-2020-14781

CVE-2020-24512

CVE-2020-14798

CVE-2021-2341

CVE-2020-14796

CVE-2022-22942

CVE-2022-29154

CVE-2022-2526

CVE-2022-21541

CVE-2022-34169

CVE-2022-21540

CVE-2022-21624

CVE-2022-21626

CVE-2022-21628

CVE-2022-21619

CVE-2007-2285

CVE-2018-8046

CVE-2020-26137

CVE-2021-3177

CVE-2020-26116

CVE-2022-1729

CVE-2022-32250

CVE-2022-1271

Impacto

Vulnerabilidades de riesgo crítico

CVE-2019-17571: Incluida en Log4j 1.2 está una clase de SocketServer vulnerable a deserialización de datos no confiables, que puede ser explotado para ejecutar código arbitrario.

CVE-2020-14343: Vulnerabilidad descubierta en las bibliotecas PyYAML anteriores a la versión 5.4, susceptibles a la ejecución arbitraria de código cuando procesan archivos YAML no confiables a través del método full_load o con el loader FullLoader.

CVE-2020-14871: Vulnerabilidad en un software de una tercera parte, incluido en Contrail Service Orchestration (CSO).

Mitigación

Instalar las respectivas actualizaciones entregadas por el proveedor.

Productos afectados

Contrail Cloud in release 13.7.0.

Contrail Networking anteriores a la versión 2011.

Contrail Networking versiones posteriores a R22.1 y anteriores a R22.3.

Contrail Service Orchestration (CSO) anterior a 6.3.0.

Junos OS 12.3 version 12.3R12-S19 and later versions.

Junos OS 15.1 version 15.1R7-S10 and later versions.

Junos OS 15.1 versions prior to 15.1R7-S12.

Junos OS 17.3 version 17.3R3-S12 and later versions.

Junos OS 18.4 version 18.4R3-S9 and later versions.

Junos OS 19.1 version 19.1R3-S7 and later versions.

Junos OS 19.1 versions prior to 19.1R3-S9.

Junos OS 19.2 version 19.2R3-S3 and later versions.

Junos OS 19.2 versions prior to 19.2R1-S9, 19.2R3-S5.

Junos OS 19.3 version 19.3R2-S7, 19.3R3-S3 and later versions prior to 19.3R3-S7.

Junos OS 19.3 versions prior to 19.3R3-S6.

Junos OS 19.4 version 19.4R2-S7, 19.4R3-S5 and later versions prior to 19.4R3-S10.

Junos OS 19.4 versions prior to 19.4R2-S7, 19.4R3-S8.

Junos OS 19.4 versions prior to 19.4R3-S9.

Junos OS 20.1 version 20.1R1 and later versions.

Junos OS 20.1 version 20.1R3-S1 and later versions.

Junos OS 20.1 versions prior to 20.1R3-S4.

Junos OS 20.2 version 20.2R3-S2 and later versions prior to 20.2R3-S6.

Junos OS 20.2 versions prior to 20.2R3-S5.

Junos OS 20.2 versions prior to 20.2R3-S5.

Junos OS 20.3 version 20.3R3-S1 and later versions prior to 20.3R3-S6.

Junos OS 20.3 versions prior to 20.3R3-S5.

Junos OS 20.3 versions prior to 20.3R3-S5.

Junos OS 20.4 version 20.4R2-S2, 20.4R3 and later versions prior to 20.4R3-S5.

Junos OS 20.4 versions prior to 20.4R3-S4.

Junos OS 20.4 versions prior to 20.4R3-S4.

Junos OS 21.1 version 21.1R2 and later versions prior to 21.1R3-S4.

Junos OS 21.1 versions prior to 21.1R1-S1, 21.1R2.

Junos OS 21.1 versions prior to 21.1R3-S3.

Junos OS 21.2 version 21.2R1-S1, 21.2R2 and later versions prior to 21.2R3-S3.

Junos OS 21.2 versions prior to 21.2R3-S2.

Junos OS 21.3 versions prior to 21.3R3-S1.

Junos OS 21.3 versions prior to 21.3R3-S2.

Junos OS 21.4 versions prior to 21.4R3.

Junos OS 21.4 versions prior to 21.4R3.

Junos OS 22.1 versions prior to 22.1R2.

Junos OS 22.1 versions prior to 22.1R2-S1, 22.1R3.

Junos OS 22.2 versions prior to 22.2R1-S2, 22.2R2.

Junos OS 22.3 versions prior to 22.3R1-S1, 22.3R2.

Junos OS All versions prior to 19.3R3-S7.

Junos OS Evolved 21.1 versions prior to 21.1R2-EVO.

Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions.

Junos OS Evolved 21.2-EVO versions prior to 21.2R3-S4-EVO.

Junos OS Evolved 21.3 versions prior to 21.3R3-EVO.

Junos OS Evolved 21.3-EVO version 21.3R1-EVO and later versions.

Junos OS Evolved 21.4 versions prior to 21.4R2-EVO.

Junos OS Evolved 21.4-EVO versions prior to 21.4R2-EVO.

Junos OS Evolved 22.1 versions prior to 22.1R2-EVO.

Junos OS Evolved 22.1-EVO versions prior to 22.1R3-EVO.

Junos OS Evolved 22.2 versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.

Junos OS Evolved All versions prior to 20.4R3-S3-EVO.

Junos OS Evolved All versions prior to 20.4R3-S4.

Junos OS Evolved on PTX10003 21.3 versions prior to 21.3R3-S1-EVO.

Junos OS Evolved on PTX10003 All versions prior to 20.4R3-S4-EVO.

Junos OS Evolved on PTX1000321.4 versions prior to 21.4R2-S2-EVO, 21.4R3-EVO.

Junos OS Evolved on PTX1000322.1 versions prior to 22.1R1-S2-EVO, 22.1R2-EVO.

Junos OS Evolved on PTX1000322.2 versions prior to 22.2R2-EVO.

Junos OS Evolved versión 22.3R1-EVO.

Junos OS Evolved19.3 versions prior to 19.3R3-EVO.

Junos OS Evolved19.4 versions prior to 19.4R3-EVO.

Junos OS Evolved20.1 versions prior to 20.1R3-EVO.

Junos OS Evolved20.2 versions prior to 20.2R2-EVO.

Junos OS Evolved21.1 versions prior to 21.1R2-EVO.

Junos OS Evolved21.2 version 21.2R1 and later versions.

Junos OS Evolved21.3 versions prior to 21.3R2-EVO.

Junos OS Evolved21.3-EVO version 21.3R3-EVO and later versions.

Junos OS Evolved21.4 versions prior to 21.4R2-S1-EVO, 21.4R3-EVO.

Junos OS Evolved21.4-EVO version 21.4R1-S2-EVO, 21.4R2-EVO and later prior to 21.4R2-S1-EVO.

Junos OS Evolved21.4-EVO versions prior to 21.4R2-S2-EVO, 21.4R3-EVO.

Junos OS Evolved22.1 versions prior to 22.1R2-EVO.

Junos OS Evolved22.1-EVO version 22.1R2-EVO and later versions prior to 22.1R3-EVO.

Junos OS Evolved22.1-EVO versions prior to 22.1R1-S2-EVO, 22.1R2-EVO.

Junos OS Evolved22.2-EVO versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.

Junos OS Evolved22.2-EVO versions prior to 22.2R1-S1-EVO, 22.2R2-EVO.

Junos OS EvolvedAll versions prior to 19.2R3-EVO.

Junos OS EvolvedAll versions prior to 20.4R2-EVO.

Junos OS EvolvedAll versions prior to 20.4R3-S4-EVO.

Junos OS on ACX2K Series 20.3 versions prior to 20.3R3-S6.

Junos OS on ACX2K Series 20.4 versions prior to 20.4R3-S4.

Junos OS on ACX2K Series 21.2 versions prior to 21.2R3-S3.

Junos OS on ACX2K Series All 20.2 versions.

Junos OS on ACX2K Series All 21.1 versions.

Junos OS on ACX2K Series All versions prior to 19.4R3-S9.

Junos OS on MX Series 20.3 version 20.3R1 and later versions.

Junos OS on MX Series All versions prior to 20.2R3-S5.

Junos OS on MX Series and SRX Series20.2 versions prior to 20.2R3-S6.

Junos OS on MX Series and SRX Series20.3 versions prior to 20.3R3-S6.

Junos OS on MX Series and SRX Series20.4 versions prior to 20.4R3-S5.

Junos OS on MX Series and SRX Series20.4 versions prior to 20.4R3-S5.

Junos OS on MX Series and SRX Series21.1 versions prior to 21.1R3-S4.

Junos OS on MX Series and SRX Series21.1 versions prior to 21.1R3-S4.

Junos OS on MX Series and SRX Series21.2 versions prior to 21.2R3-S2.

Junos OS on MX Series and SRX Series21.2 versions prior to 21.2R3-S3.

Junos OS on MX Series and SRX Series21.3 versions prior to 21.3R3-S1.

Junos OS on MX Series and SRX Series21.3 versions prior to 21.3R3-S3.

Junos OS on MX Series and SRX Series21.4 versions prior to 21.4R3.

Junos OS on MX Series and SRX Series21.4 versions prior to 21.4R3.

Junos OS on MX Series and SRX Series22.1 versions prior to 22.1R1-S2, 22.1R2.

Junos OS on MX Series and SRX Series22.1 versions prior to 22.1R2-S1, 22.1R3.

Junos OS on MX Series and SRX Series22.2 versions prior to 22.2R1-S1, 22.2R2.

Junos OS on MX Series and SRX Series22.2 versions prior to 22.2R1-S2, 22.2R2.

Junos OS on MX Series and SRX SeriesAll versions prior to 19.4R3-S10.

Junos OS on MX Series20.1 version 20.1R3-S5 and later versions.

Junos OS on MX Series20.2 versions prior to 20.2R3-S5.

Junos OS on MX Series20.3 versions prior to 20.3R3-S5.

Junos OS on MX Series20.4 versions prior to 20.4R3-S4.

Junos OS on MX Series21.1 versions prior to 21.1R3-S3.

Junos OS on MX Series21.2 versions prior to 21.2R3-S1.

Junos OS on MX Series21.3 versions prior to 21.3R3.

Junos OS on MX Series21.4 versions prior to 21.4R2-S1, 21.4R3.

Junos OS on MX Series22.1 versions prior to 22.1R2.

Junos OS on MX SeriesAll versions prior to 19.4R3-S9.

Junos OS on QFX10K Series 20.2 versions prior to 20.2R3-S6.

Junos OS on QFX10K Series 20.3 versions prior to 20.3R3-S6.

Junos OS on QFX10K Series 20.4 versions prior to 20.4R3-S5.

Junos OS on QFX10K Series 21.1 versions prior to 21.1R3-S4.

Junos OS on QFX10K Series 21.2 versions prior to 21.2R3-S3.

Junos OS on QFX10K Series 21.3 versions prior to 21.3R3-S2.

Junos OS on QFX10K Series 21.4 versions prior to 21.4R2-S2, 21.4R3.

Junos OS on QFX10K Series 22.1 versions prior to 22.1R2.

Junos OS on QFX10K Series 22.2 versions prior to 22.2R1-S2, 22.2R2.

Junos OS on QFX10K Series All versions prior to 19.4R3-S9.

Junos OS on QFX10K Series:

Junos OS on QFX5k Series, EX46xx Series

Junos OS on QFX5k Series, EX46xx Series 20.3 versions prior to 20.3R3-S5.

Junos OS on QFX5k Series, EX46xx Series 20.4 versions prior to 20.4R3-S4.

Junos OS on QFX5k Series, EX46xx Series 21.1 versions prior to 21.1R3-S3.

Junos OS on QFX5k Series, EX46xx Series 21.2 versions prior to 21.2R3-S1.

Junos OS on QFX5k Series, EX46xx Series 21.3 versions prior to 21.3R3 on.

Junos OS on QFX5k Series, EX46xx Series 21.4 versions prior to 21.4R3 on.

Junos OS on QFX5k Series, EX46xx Series 22.1 versions prior to 22.1R2 on.

Junos OS on QFX5k Series, EX46xx Series All versions prior to 20.2R3-S5.

Junos OS on SRX 5000 Series 20.4 versions prior to 20.4R3-S5.

Junos OS on SRX 5000 Series 21.1 versions prior to 21.1R3-S4.

Junos OS on SRX 5000 Series 21.2 versions prior to 21.2R3-S3.

Junos OS on SRX 5000 Series 21.3 versions prior to 21.3R3-S3.

Junos OS on SRX 5000 Series 21.4 versions prior to 21.4R3-S2.

Junos OS on SRX 5000 Series 22.1 versions prior to 22.1R2-S2, 22.1R3.

Junos OS on SRX 5000 Series 22.2 versions prior to 22.2R3.

Junos OS on SRX 5000 Series 22.3 versions prior to 22.3R1-S1, 22.3R2.

Junos OS on SRX Series 19.2 versions prior to 19.2R3-S6.

Junos OS on SRX Series 19.3 versions prior to 19.3R3-S6.

Junos OS on SRX Series 19.4 versions prior to 19.4R2-S8, 19.4R3-S10.

Junos OS on SRX Series 19.4 versions prior to 19.4R3-S9.

Junos OS on SRX Series 20.2 versions prior to 20.2R3-S5.

Junos OS on SRX Series 20.2 versions prior to 20.2R3-S6.

Junos OS on SRX Series 20.3 versions prior to 20.3R3-S4.

Junos OS on SRX Series 20.3 versions prior to 20.3R3-S5.

Junos OS on SRX Series 20.4 versions prior to 20.4R3-S3.

Junos OS on SRX Series 20.4 versions prior to 20.4R3-S5.

Junos OS on SRX Series 21.1 versions prior to 21.1R3.

Junos OS on SRX Series 21.1 versions prior to 21.1R3-S4.

Junos OS on SRX Series 21.2 versions prior to 21.2R3.

Junos OS on SRX Series 21.2 versions prior to 21.2R3.

Junos OS on SRX Series 21.3 versions prior to 21.3R2.

Junos OS on SRX Series 21.3 versions prior to 21.3R3.

Junos OS on SRX Series 21.4 versions prior to 21.4R2.

Junos OS on SRX Series 21.4 versions prior to 21.4R2.

Junos OS on SRX Series All versions prior to 19.3R3-S7.

Junos OS on SRX Series and on MX Series 19.4 versions prior to 19.4R2-S8, 19.4R3-S10.

Junos OS on SRX Series and on MX Series 20.1 versions 20.1R1 and later versions.

Junos OS on SRX Series and on MX Series 20.2 versions prior to 20.2R3-S6.

Junos OS on SRX Series and on MX Series 20.3 versions prior to 20.3R3-S6.

Junos OS on SRX Series and on MX Series 20.4 versions prior to 20.4R3-S5.

Junos OS on SRX Series and on MX Series 21.1 versions prior to 21.1R3-S5.

Junos OS on SRX Series and on MX Series 21.2 versions prior to 21.2R3-S1.

Junos OS on SRX Series and on MX Series 21.3 versions prior to 21.3R3.

Junos OS on SRX Series and on MX Series 21.4 versions prior to 21.4R2-S2, 21.4R3.

Junos OS on SRX Series and on MX Series 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1.

Junos OS on SRX Series and on MX Series All versions prior to 19.3R3-S7.

Junos OS on SRX Series, and MX Series with SPC3 19.4 versions prior to 19.4R3-S9.

Junos OS on SRX Series, and MX Series with SPC3 20.1 version 20.1R1 and later versions.

Junos OS on SRX Series, and MX Series with SPC3 All versions prior to 19.3R3-S7.

Junos OS on SRX Series, and MX Series with SPC3 All versions prior to 19.4R3-S10.

Junos OS on SRX Series, and MX Series with SPC320.2 versions prior to 20.2R3-S5.

Junos OS on SRX Series, and MX Series with SPC320.2 versions prior to 20.2R3-S6.

Junos OS on SRX Series, and MX Series with SPC320.3 versions prior to 20.3R3-S5.

Junos OS on SRX Series, and MX Series with SPC320.3 versions prior to 20.3R3-S6.

Junos OS on SRX Series, and MX Series with SPC320.4 versions prior to 20.4R3-S4.

Junos OS on SRX Series, and MX Series with SPC320.4 versions prior to 20.4R3-S5.

Junos OS on SRX Series, and MX Series with SPC321.1 versions prior to 21.1R3-S3.

Junos OS on SRX Series, and MX Series with SPC321.1 versions prior to 21.1R3-S4.

Junos OS on SRX Series, and MX Series with SPC321.2 versions prior to 21.2R3-S2.

Junos OS on SRX Series, and MX Series with SPC321.2 versions prior to 21.2R3-S3.

Junos OS on SRX Series, and MX Series with SPC321.3 versions prior to 21.3R3-S1.

Junos OS on SRX Series, and MX Series with SPC321.3 versions prior to 21.3R3-S3.

Junos OS on SRX Series, and MX Series with SPC321.4 versions prior to 21.4R2-S1, 21.4R3.

Junos OS on SRX Series, and MX Series with SPC321.4 versions prior to 21.4R3-S1.

Junos OS on SRX Series, and MX Series with SPC322.1 versions prior to 22.1R1-S2, 22.1R2.

Junos OS on SRX Series, and MX Series with SPC322.1 versions prior to 22.1R2-S2, 22.1R3.

Junos OS on SRX Series, and MX Series with SPC322.2 versions prior to 22.2R2.

Junos OS PTX Series and QFX10000 Series20.2 versions prior to 20.2R3-S6.

Junos OS PTX Series and QFX10000 Series20.3 versions prior to 20.3R3-S6.

Junos OS PTX Series and QFX10000 Series20.4 versions prior to 20.4R3-S4.

Junos OS PTX Series and QFX10000 Series21.1 versions prior to 21.1R3-S3.

Junos OS PTX Series and QFX10000 Series21.2 versions prior to 21.2R3-S1.

Junos OS PTX Series and QFX10000 Series21.3 versions prior to 21.3R3.

Junos OS PTX Series and QFX10000 Series21.4 versions prior to 21.4R3.

Junos OS PTX Series and QFX10000 Series22.1 versions prior to 22.1R2.

Junos OS PTX Series and QFX10000 Series22.2 versions prior to 22.2R2.

Junos OS versión 22.3R1.

Junos OS:20.4 versions prior to 20.4R3-S4.

Junos OS:21.1 versions prior to 21.1R3-S3.

Junos OS:21.2 versions prior to 21.2R3-S1.

Junos OS:21.3 versions prior to 21.3R3.

Junos OS:21.4 versions prior to 21.4R3.

Junos OS:22.1 versions prior to 22.1R2.

Junos OS All versions prior to 20.2R3-S7.

Junos OS19.1 versions prior to 19.1R3-S2.

Junos OS19.2 version 19.2R1 and later versions.

Junos OS19.2 versions prior to 19.2R3.

Junos OS19.3 versions prior to 19.3R3.

Junos OS19.3 versions prior to 19.3R3-S6.

Junos OS19.4 versions prior to 19.4R2-S7, 19.4R3-S9.

Junos OS19.4 versions prior to 19.4R2-S8, 19.4R3-S9.

Junos OS19.4 versions prior to 19.4R3.

Junos OS20.1 versions prior to 20.1R2.

Junos OS20.1 versions prior to 20.1R3-S4.

Junos OS20.2 versions prior to 20.2R2.

Junos OS20.2 versions prior to 20.2R3-S5.

Junos OS20.2 versions prior to 20.2R3-S5.

Junos OS20.3 versions prior to 20.3R3-S4.

Junos OS20.3 versions prior to 20.3R3-S5.

Junos OS20.4 versions prior to 20.4R3-S4.

Junos OS20.4 versions prior to 20.4R3-S4.

Junos OS21.1 versions prior to 21.1R3-S3.

Junos OS21.1 versions prior to 21.1R3-S3.

Junos OS21.1 versions prior to 21.1R3-S4.

Junos OS21.2 versions prior to 21.2R3-S1.

Junos OS21.2 versions prior to 21.2R3-S2.

Junos OS21.2 versions prior to 21.2R3-S3.

Junos OS21.3 versions prior to 21.3R3-S1.

Junos OS21.3 versions prior to 21.3R3-S1.

Junos OS21.3 versions prior to 21.3R3-S2.

Junos OS21.4 versions prior to 21.4R2.

Junos OS21.4 versions prior to 21.4R2-S1, 21.4R3.

Junos OS21.4 versions prior to 21.4R2-S2, 21.4R3.

Junos OS22.1 version 22.1R2 and later versions.

Junos OS22.1 versions prior to 22.1R1-S2, 22.1R2.

Junos OS22.1 versions prior to 22.1R2.

Junos OS22.1 versions prior to 22.1R2.

Junos OS22.1 versions prior to 22.1R3.

Junos OS22.2 versions prior to 22.2R1-S1, 22.2R2.

Junos OS22.2 versions prior to 22.2R2.

Junos OSAll versions prior to 18.4R2-S7.

Junos OSAll versions prior to 19.1R3-S9.

Junos OSAll versions prior to 19.3R3-S7.

Junos Space versions prior to 22.3R1.

NorthStar Controller versions prior to 6.2.3.

Enlaces

https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011?language=en_US

https://supportportal.juniper.net/s/article/2022-12-Out-of-Cycle-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-BGP-session-will-flap-upon-receipt-of-a-specific-optional-transitive-attribute-in-version-22-3R1-CVE-2022-22184?language=en_US

https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot–CVE-2023-22405?language=en_US

https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27223

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21309

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22184

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6755

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22397

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3765

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22403

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22407

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22409

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14871

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22408

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22406

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22399

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11287

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22398

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22416

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22401

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22415

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22412

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22394

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22393

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22391

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22414

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22411

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22396

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22405

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22400

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22410

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22404

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22404

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22417

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22402

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22413

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3621

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35498

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40085

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2161

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21349

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20934

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2432

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2285

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8046

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271

Informe

El informe oficial publicado por el CSIRT del Gobierno de Chile está disponible en el siguiente enlace: 9VSA23-00773-01.

9VSA23-00773-01 CSIRT comparte vulnerabilidades en varios productos de Juniper Networks