Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mx10 Vendor: juniper

About This Product

mx10 is a software product offered by juniper. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 59 known vulnerabilities affecting juniper mx10. This includes 1 critical-severity issue and 27 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2015 to 2024, indicating a sustained research interest and ongoing security attention. 31 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-6382 2015-01-16 2025-04-12 - 7.1 Likely
CVE-2014-9708 2015-03-31 2025-04-12 - 5.0 Likely
CVE-2017-10611 2017-10-13 2025-04-20 6.5 4.3 Likely
CVE-2018-0002 2018-01-10 2024-11-21 8.2 4.3 Likely
CVE-2018-15504 2018-08-18 2024-11-21 7.5 5.0 Likely
CVE-2019-0007 2019-01-15 2024-11-21 9.3 7.5 Likely
CVE-2019-0063 2019-10-09 2024-11-21 6.5 4.3 Likely
CVE-2019-0065 2019-10-09 2024-11-21 5.3 4.3 Likely
CVE-2020-1608 2020-01-15 2024-11-21 7.5 7.8 Likely
CVE-2020-1633 2020-04-09 2024-11-21 7.4 3.3 Unknown
CVE-2020-1649 2020-07-17 2024-11-21 7.5 5.0 Likely
CVE-2020-1650 2020-07-17 2024-11-21 7.5 5.0 Likely
CVE-2020-1651 2020-07-17 2024-11-21 6.5 3.3 Unknown
CVE-2020-1655 2020-07-17 2024-11-21 5.3 5.0 Likely
CVE-2020-1665 2020-10-16 2024-11-21 5.3 5.0 Likely
CVE-2020-1680 2020-10-16 2024-11-21 5.3 5.0 Likely
CVE-2021-0202 2021-01-15 2024-11-21 7.5 5.0 Likely
CVE-2021-0205 2021-01-15 2024-11-21 5.8 4.3 Likely
CVE-2021-0228 2021-04-22 2024-11-21 6.5 3.3 Unknown
CVE-2021-0238 2021-04-22 2024-11-21 5.5 2.1 Unknown
CVE-2021-0251 2021-04-22 2024-11-21 8.6 5.0 Likely
CVE-2021-0257 2021-04-22 2024-11-21 6.5 3.3 Unknown
CVE-2021-0264 2021-04-22 2024-11-21 5.9 5.0 Likely
CVE-2021-0288 2021-07-15 2024-11-21 6.5 3.3 Unknown
CVE-2021-0289 2021-07-15 2024-11-21 6.5 2.9 Unknown
CVE-2021-0290 2021-07-15 2024-11-21 6.5 3.3 Unknown
CVE-2021-31351 2021-10-19 2024-11-21 7.5 5.0 Likely
CVE-2021-31366 2021-10-19 2024-11-21 6.5 3.3 Unknown
CVE-2021-31369 2021-10-19 2024-11-21 5.3 4.3 Likely
CVE-2021-31379 2021-10-19 2024-11-21 7.5 4.3 Likely
CVE-2022-22153 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2022-22160 2022-01-19 2024-11-21 6.5 2.9 Unknown
CVE-2022-22175 2022-01-19 2024-11-21 7.5 4.3 Likely
CVE-2022-22178 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2022-22198 2022-04-14 2024-11-21 7.5 7.1 Likely
CVE-2022-22204 2022-07-20 2024-11-21 5.3 - -
CVE-2022-22207 2022-07-20 2024-11-21 7.5 - -
CVE-2022-22210 2022-07-20 2024-11-21 6.5 - -
CVE-2022-22236 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22249 2022-10-18 2024-11-21 6.5 - -
CVE-2023-22394 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22404 2023-01-13 2024-11-21 6.5 - -
CVE-2023-22409 2023-01-13 2024-11-21 5.5 - -
CVE-2023-22410 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22412 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22413 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22415 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22416 2023-01-13 2024-11-21 7.5 - -
CVE-2023-28974 2023-04-17 2024-11-21 7.4 - -
CVE-2023-28976 2023-04-17 2024-11-21 7.5 - -
CVE-2023-36832 2023-07-14 2024-11-21 7.5 - -
CVE-2023-28985 2023-07-14 2024-11-21 7.5 - -
CVE-2023-36848 2023-07-14 2024-11-21 6.5 - -
CVE-2023-36850 2023-07-14 2024-11-21 6.5 - -
CVE-2024-21587 2024-01-12 2024-11-21 6.5 - -
CVE-2024-21607 2024-01-12 2024-11-21 5.3 - -
CVE-2024-21610 2024-04-12 2025-05-19 4.3 - -
CVE-2024-30378 2024-04-16 2025-04-11 5.5 - -
CVE-2024-39539 2024-07-11 2025-04-11 5.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for juniper mx10 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.