{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"CTPView versions versions ant\u00e9rieures \u00e0 9.1R5","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2","product":{"name":"Session Smart Router","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-3707","url":"https://www.cve.org/CVERecord?id=CVE-2022-3707"},{"name":"CVE-2024-21602","url":"https://www.cve.org/CVERecord?id=CVE-2024-21602"},{"name":"CVE-2022-41974","url":"https://www.cve.org/CVERecord?id=CVE-2022-41974"},{"name":"CVE-2023-38802","url":"https://www.cve.org/CVERecord?id=CVE-2023-38802"},{"name":"CVE-2023-21938","url":"https://www.cve.org/CVERecord?id=CVE-2023-21938"},{"name":"CVE-2023-21843","url":"https://www.cve.org/CVERecord?id=CVE-2023-21843"},{"name":"CVE-2022-42720","url":"https://www.cve.org/CVERecord?id=CVE-2022-42720"},{"name":"CVE-2022-30594","url":"https://www.cve.org/CVERecord?id=CVE-2022-30594"},{"name":"CVE-2022-41973","url":"https://www.cve.org/CVERecord?id=CVE-2022-41973"},{"name":"CVE-2023-0461","url":"https://www.cve.org/CVERecord?id=CVE-2023-0461"},{"name":"CVE-2024-21616","url":"https://www.cve.org/CVERecord?id=CVE-2024-21616"},{"name":"CVE-2021-25220","url":"https://www.cve.org/CVERecord?id=CVE-2021-25220"},{"name":"CVE-2023-2235","url":"https://www.cve.org/CVERecord?id=CVE-2023-2235"},{"name":"CVE-2023-23454","url":"https://www.cve.org/CVERecord?id=CVE-2023-23454"},{"name":"CVE-2023-21954","url":"https://www.cve.org/CVERecord?id=CVE-2023-21954"},{"name":"CVE-2022-2964","url":"https://www.cve.org/CVERecord?id=CVE-2022-2964"},{"name":"CVE-2023-21939","url":"https://www.cve.org/CVERecord?id=CVE-2023-21939"},{"name":"CVE-2023-1281","url":"https://www.cve.org/CVERecord?id=CVE-2023-1281"},{"name":"CVE-2024-21599","url":"https://www.cve.org/CVERecord?id=CVE-2024-21599"},{"name":"CVE-2022-47929","url":"https://www.cve.org/CVERecord?id=CVE-2022-47929"},{"name":"CVE-2022-3628","url":"https://www.cve.org/CVERecord?id=CVE-2022-3628"},{"name":"CVE-2024-21614","url":"https://www.cve.org/CVERecord?id=CVE-2024-21614"},{"name":"CVE-2023-21830","url":"https://www.cve.org/CVERecord?id=CVE-2023-21830"},{"name":"CVE-2023-3817","url":"https://www.cve.org/CVERecord?id=CVE-2023-3817"},{"name":"CVE-2023-26464","url":"https://www.cve.org/CVERecord?id=CVE-2023-26464"},{"name":"CVE-2020-0466","url":"https://www.cve.org/CVERecord?id=CVE-2020-0466"},{"name":"CVE-2021-26691","url":"https://www.cve.org/CVERecord?id=CVE-2021-26691"},{"name":"CVE-2022-4269","url":"https://www.cve.org/CVERecord?id=CVE-2022-4269"},{"name":"CVE-2022-42703","url":"https://www.cve.org/CVERecord?id=CVE-2022-42703"},{"name":"CVE-2024-21607","url":"https://www.cve.org/CVERecord?id=CVE-2024-21607"},{"name":"CVE-2023-0286","url":"https://www.cve.org/CVERecord?id=CVE-2023-0286"},{"name":"CVE-2023-32067","url":"https://www.cve.org/CVERecord?id=CVE-2023-32067"},{"name":"CVE-2023-0266","url":"https://www.cve.org/CVERecord?id=CVE-2023-0266"},{"name":"CVE-2019-17571","url":"https://www.cve.org/CVERecord?id=CVE-2019-17571"},{"name":"CVE-2022-39189","url":"https://www.cve.org/CVERecord?id=CVE-2022-39189"},{"name":"CVE-2022-3239","url":"https://www.cve.org/CVERecord?id=CVE-2022-3239"},{"name":"CVE-2022-43750","url":"https://www.cve.org/CVERecord?id=CVE-2022-43750"},{"name":"CVE-2022-3567","url":"https://www.cve.org/CVERecord?id=CVE-2022-3567"},{"name":"CVE-2023-2828","url":"https://www.cve.org/CVERecord?id=CVE-2023-2828"},{"name":"CVE-2021-4104","url":"https://www.cve.org/CVERecord?id=CVE-2021-4104"},{"name":"CVE-2023-22081","url":"https://www.cve.org/CVERecord?id=CVE-2023-22081"},{"name":"CVE-2023-20569","url":"https://www.cve.org/CVERecord?id=CVE-2023-20569"},{"name":"CVE-2024-21596","url":"https://www.cve.org/CVERecord?id=CVE-2024-21596"},{"name":"CVE-2022-3564","url":"https://www.cve.org/CVERecord?id=CVE-2022-3564"},{"name":"CVE-2021-33656","url":"https://www.cve.org/CVERecord?id=CVE-2021-33656"},{"name":"CVE-2023-1582","url":"https://www.cve.org/CVERecord?id=CVE-2023-1582"},{"name":"CVE-2022-4129","url":"https://www.cve.org/CVERecord?id=CVE-2022-4129"},{"name":"CVE-2022-41218","url":"https://www.cve.org/CVERecord?id=CVE-2022-41218"},{"name":"CVE-2023-2194","url":"https://www.cve.org/CVERecord?id=CVE-2023-2194"},{"name":"CVE-2024-21604","url":"https://www.cve.org/CVERecord?id=CVE-2024-21604"},{"name":"CVE-2023-32360","url":"https://www.cve.org/CVERecord?id=CVE-2023-32360"},{"name":"CVE-2022-0934","url":"https://www.cve.org/CVERecord?id=CVE-2022-0934"},{"name":"CVE-2020-9493","url":"https://www.cve.org/CVERecord?id=CVE-2020-9493"},{"name":"CVE-2021-3573","url":"https://www.cve.org/CVERecord?id=CVE-2021-3573"},{"name":"CVE-2022-2196","url":"https://www.cve.org/CVERecord?id=CVE-2022-2196"},{"name":"CVE-2021-39275","url":"https://www.cve.org/CVERecord?id=CVE-2021-39275"},{"name":"CVE-2022-42896","url":"https://www.cve.org/CVERecord?id=CVE-2022-42896"},{"name":"CVE-2022-21699","url":"https://www.cve.org/CVERecord?id=CVE-2022-21699"},{"name":"CVE-2024-21600","url":"https://www.cve.org/CVERecord?id=CVE-2024-21600"},{"name":"CVE-2021-33655","url":"https://www.cve.org/CVERecord?id=CVE-2021-33655"},{"name":"CVE-2023-0767","url":"https://www.cve.org/CVERecord?id=CVE-2023-0767"},{"name":"CVE-2022-1462","url":"https://www.cve.org/CVERecord?id=CVE-2022-1462"},{"name":"CVE-2023-23920","url":"https://www.cve.org/CVERecord?id=CVE-2023-23920"},{"name":"CVE-2023-20593","url":"https://www.cve.org/CVERecord?id=CVE-2023-20593"},{"name":"CVE-2024-21606","url":"https://www.cve.org/CVERecord?id=CVE-2024-21606"},{"name":"CVE-2022-0330","url":"https://www.cve.org/CVERecord?id=CVE-2022-0330"},{"name":"CVE-2022-41222","url":"https://www.cve.org/CVERecord?id=CVE-2022-41222"},{"name":"CVE-2016-10009","url":"https://www.cve.org/CVERecord?id=CVE-2016-10009"},{"name":"CVE-2022-23305","url":"https://www.cve.org/CVERecord?id=CVE-2022-23305"},{"name":"CVE-2022-2663","url":"https://www.cve.org/CVERecord?id=CVE-2022-2663"},{"name":"CVE-2023-23918","url":"https://www.cve.org/CVERecord?id=CVE-2023-23918"},{"name":"CVE-2024-21591","url":"https://www.cve.org/CVERecord?id=CVE-2024-21591"},{"name":"CVE-2020-12321","url":"https://www.cve.org/CVERecord?id=CVE-2020-12321"},{"name":"CVE-2022-23307","url":"https://www.cve.org/CVERecord?id=CVE-2022-23307"},{"name":"CVE-2022-3524","url":"https://www.cve.org/CVERecord?id=CVE-2022-3524"},{"name":"CVE-2022-39188","url":"https://www.cve.org/CVERecord?id=CVE-2022-39188"},{"name":"CVE-2023-3341","url":"https://www.cve.org/CVERecord?id=CVE-2023-3341"},{"name":"CVE-2022-37434","url":"https://www.cve.org/CVERecord?id=CVE-2022-37434"},{"name":"CVE-2022-2795","url":"https://www.cve.org/CVERecord?id=CVE-2022-2795"},{"name":"CVE-2022-22942","url":"https://www.cve.org/CVERecord?id=CVE-2022-22942"},{"name":"CVE-2022-43945","url":"https://www.cve.org/CVERecord?id=CVE-2022-43945"},{"name":"CVE-2022-3625","url":"https://www.cve.org/CVERecord?id=CVE-2022-3625"},{"name":"CVE-2021-34798","url":"https://www.cve.org/CVERecord?id=CVE-2021-34798"},{"name":"CVE-2024-21587","url":"https://www.cve.org/CVERecord?id=CVE-2024-21587"},{"name":"CVE-2022-42721","url":"https://www.cve.org/CVERecord?id=CVE-2022-42721"},{"name":"CVE-2022-4378","url":"https://www.cve.org/CVERecord?id=CVE-2022-4378"},{"name":"CVE-2022-4254","url":"https://www.cve.org/CVERecord?id=CVE-2022-4254"},{"name":"CVE-2024-21617","url":"https://www.cve.org/CVERecord?id=CVE-2024-21617"},{"name":"CVE-2023-1195","url":"https://www.cve.org/CVERecord?id=CVE-2023-1195"},{"name":"CVE-2024-21589","url":"https://www.cve.org/CVERecord?id=CVE-2024-21589"},{"name":"CVE-2023-21937","url":"https://www.cve.org/CVERecord?id=CVE-2023-21937"},{"name":"CVE-2023-22809","url":"https://www.cve.org/CVERecord?id=CVE-2023-22809"},{"name":"CVE-2022-20141","url":"https://www.cve.org/CVERecord?id=CVE-2022-20141"},{"name":"CVE-2021-4155","url":"https://www.cve.org/CVERecord?id=CVE-2021-4155"},{"name":"CVE-2023-2650","url":"https://www.cve.org/CVERecord?id=CVE-2023-2650"},{"name":"CVE-2024-21595","url":"https://www.cve.org/CVERecord?id=CVE-2024-21595"},{"name":"CVE-2021-3564","url":"https://www.cve.org/CVERecord?id=CVE-2021-3564"},{"name":"CVE-2021-3621","url":"https://www.cve.org/CVERecord?id=CVE-2021-3621"},{"name":"CVE-2023-0394","url":"https://www.cve.org/CVERecord?id=CVE-2023-0394"},{"name":"CVE-2022-22164","url":"https://www.cve.org/CVERecord?id=CVE-2022-22164"},{"name":"CVE-2024-21597","url":"https://www.cve.org/CVERecord?id=CVE-2024-21597"},{"name":"CVE-2021-3752","url":"https://www.cve.org/CVERecord?id=CVE-2021-3752"},{"name":"CVE-2023-0386","url":"https://www.cve.org/CVERecord?id=CVE-2023-0386"},{"name":"CVE-2016-2183","url":"https://www.cve.org/CVERecord?id=CVE-2016-2183"},{"name":"CVE-2021-26341","url":"https://www.cve.org/CVERecord?id=CVE-2021-26341"},{"name":"CVE-2022-38023","url":"https://www.cve.org/CVERecord?id=CVE-2022-38023"},{"name":"CVE-2023-22045","url":"https://www.cve.org/CVERecord?id=CVE-2023-22045"},{"name":"CVE-2022-1679","url":"https://www.cve.org/CVERecord?id=CVE-2022-1679"},{"name":"CVE-2023-22049","url":"https://www.cve.org/CVERecord?id=CVE-2023-22049"},{"name":"CVE-2023-38408","url":"https://www.cve.org/CVERecord?id=CVE-2023-38408"},{"name":"CVE-2022-3619","url":"https://www.cve.org/CVERecord?id=CVE-2022-3619"},{"name":"CVE-2021-0920","url":"https://www.cve.org/CVERecord?id=CVE-2021-0920"},{"name":"CVE-2023-1829","url":"https://www.cve.org/CVERecord?id=CVE-2023-1829"},{"name":"CVE-2022-25265","url":"https://www.cve.org/CVERecord?id=CVE-2022-25265"},{"name":"CVE-2022-1789","url":"https://www.cve.org/CVERecord?id=CVE-2022-1789"},{"name":"CVE-2022-2873","url":"https://www.cve.org/CVERecord?id=CVE-2022-2873"},{"name":"CVE-2022-3623","url":"https://www.cve.org/CVERecord?id=CVE-2022-3623"},{"name":"CVE-2024-21611","url":"https://www.cve.org/CVERecord?id=CVE-2024-21611"},{"name":"CVE-2024-21613","url":"https://www.cve.org/CVERecord?id=CVE-2024-21613"},{"name":"CVE-2021-44228","url":"https://www.cve.org/CVERecord?id=CVE-2021-44228"},{"name":"CVE-2023-21968","url":"https://www.cve.org/CVERecord?id=CVE-2023-21968"},{"name":"CVE-2024-21612","url":"https://www.cve.org/CVERecord?id=CVE-2024-21612"},{"name":"CVE-2022-42722","url":"https://www.cve.org/CVERecord?id=CVE-2022-42722"},{"name":"CVE-2024-21603","url":"https://www.cve.org/CVERecord?id=CVE-2024-21603"},{"name":"CVE-2023-21930","url":"https://www.cve.org/CVERecord?id=CVE-2023-21930"},{"name":"CVE-2024-21585","url":"https://www.cve.org/CVERecord?id=CVE-2024-21585"},{"name":"CVE-2022-23302","url":"https://www.cve.org/CVERecord?id=CVE-2022-23302"},{"name":"CVE-2023-24329","url":"https://www.cve.org/CVERecord?id=CVE-2023-24329"},{"name":"CVE-2021-44832","url":"https://www.cve.org/CVERecord?id=CVE-2021-44832"},{"name":"CVE-2021-44790","url":"https://www.cve.org/CVERecord?id=CVE-2021-44790"},{"name":"CVE-2023-36842","url":"https://www.cve.org/CVERecord?id=CVE-2023-36842"},{"name":"CVE-2022-4139","url":"https://www.cve.org/CVERecord?id=CVE-2022-4139"},{"name":"CVE-2024-21594","url":"https://www.cve.org/CVERecord?id=CVE-2024-21594"},{"name":"CVE-2022-3028","url":"https://www.cve.org/CVERecord?id=CVE-2022-3028"},{"name":"CVE-2022-3566","url":"https://www.cve.org/CVERecord?id=CVE-2022-3566"},{"name":"CVE-2023-3446","url":"https://www.cve.org/CVERecord?id=CVE-2023-3446"},{"name":"CVE-2023-21967","url":"https://www.cve.org/CVERecord?id=CVE-2023-21967"},{"name":"CVE-2022-41674","url":"https://www.cve.org/CVERecord?id=CVE-2022-41674"},{"name":"CVE-2024-21601","url":"https://www.cve.org/CVERecord?id=CVE-2024-21601"},{"name":"CVE-2023-2124","url":"https://www.cve.org/CVERecord?id=CVE-2023-2124"},{"name":"CVE-2020-0465","url":"https://www.cve.org/CVERecord?id=CVE-2020-0465"}],"links":[],"reference":"CERTFR-2024-AVI-0027","revisions":[{"description":"Version initiale","revision_date":"2024-01-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d'entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024","url":"https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591"}]}
