Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

mpc2e_q

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

2
Related CVEsRelated VendorsRelated AssignersReports
2Vulnerabilities found

CVE-2025-52952
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-7.1||HIGH
EPSS-0.04% / 10.54%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 15:04
Updated-26 Jan, 2026 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash

An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Networks Junos OS on MX Series with MPC-BUILTIN, MPC1 through MPC9 line cards allows an unauthenticated adjacent attacker to send a malformed packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions before 22.2R3-S1, * from 22.4 before 22.4R2. This feature is not enabled by default.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-mpc2e_eqmpc9emx2008mpc2e_pmpc2empc6empc2junosmpc2e_qmpc1empc3empc2_q2x100ge_\+_4x10ge_mpc5empc2e_ng_qmpc3e-3d-ng-qmpc2e_ngmx2010mpc8e6x40ge_\+_24x10ge_mpc5eqmpc2_eqmpc7e-mratempc1_qmx4802x100ge_\+_4x10ge_mpc5eq2x100ge_\+_8x10ge_mpc4emx2020mpc1e_qmpc3e-3d-ngmpc7e-10gmpc1mx240mx96032x10ge_mpc4e6x40ge_\+_24x10ge_mpc5eJunos OS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-47496
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 16.37%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:28
Updated-26 Jan, 2026 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: MX Series: The PFE will crash on running specific command

A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). When a specific command is executed, the pfe crashes. This will cause traffic forwarding to be interrupted until the system self-recovers. Repeated execution will create a sustained DoS condition. This issue only affects MX Series devices with Line cards MPC1-MPC9. This issue affects: Junos OS on MX Series: * All versions before 21.4R3-S9, * from 22.2 before 22.2R3-S5,  * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2-S1, * from 23.4 before 23.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-mpc2e_eqmpc9emx2008mpc2e_pmpc2empc6empc2junosmpc2e_qmpc1empc3empc2_q2x100ge_\+_4x10ge_mpc5empc2e_ng_qmpc3e-3d-ng-qmpc2e_ngmx2010mpc8e6x40ge_\+_24x10ge_mpc5eqmpc2_eqmpc7e-mratempc1_qmx4802x100ge_\+_4x10ge_mpc5eq2x100ge_\+_8x10ge_mpc4empc1e_qmpc3e-3d-ngmpc7e-10gmpc1mx240mx96032x10ge_mpc4e6x40ge_\+_24x10ge_mpc5eJunos OS
CWE ID-CWE-476
NULL Pointer Dereference