Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
mx960 Vendor: juniper

About This Product

mx960 is a software product offered by juniper. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 91 known vulnerabilities affecting juniper mx960. This includes 1 critical-severity issue and 42 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2015 to 2026, indicating a sustained research interest and ongoing security attention. 48 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-6382 2015-01-16 2025-04-12 - 7.1 Likely
CVE-2014-9708 2015-03-31 2025-04-12 - 5.0 Likely
CVE-2017-10611 2017-10-13 2025-04-20 6.5 4.3 Likely
CVE-2018-0002 2018-01-10 2024-11-21 8.2 4.3 Likely
CVE-2018-15504 2018-08-18 2024-11-21 7.5 5.0 Likely
CVE-2019-0007 2019-01-15 2024-11-21 9.3 7.5 Likely
CVE-2019-0056 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0063 2019-10-09 2024-11-21 6.5 4.3 Likely
CVE-2019-0065 2019-10-09 2024-11-21 5.3 4.3 Likely
CVE-2020-1608 2020-01-15 2024-11-21 7.5 7.8 Likely
CVE-2020-1638 2020-04-08 2024-11-21 7.5 5.0 Likely
CVE-2020-1633 2020-04-09 2024-11-21 7.4 3.3 Unknown
CVE-2020-1649 2020-07-17 2024-11-21 7.5 5.0 Likely
CVE-2020-1650 2020-07-17 2024-11-21 7.5 5.0 Likely
CVE-2020-1651 2020-07-17 2024-11-21 6.5 3.3 Unknown
CVE-2020-1655 2020-07-17 2024-11-21 5.3 5.0 Likely
CVE-2020-1665 2020-10-16 2024-11-21 5.3 5.0 Likely
CVE-2020-1680 2020-10-16 2024-11-21 5.3 5.0 Likely
CVE-2021-0202 2021-01-15 2024-11-21 7.5 5.0 Likely
CVE-2021-0205 2021-01-15 2024-11-21 5.8 4.3 Likely
CVE-2021-0228 2021-04-22 2024-11-21 6.5 3.3 Unknown
CVE-2021-0238 2021-04-22 2024-11-21 5.5 2.1 Unknown
CVE-2021-0251 2021-04-22 2024-11-21 8.6 5.0 Likely
CVE-2021-0257 2021-04-22 2024-11-21 6.5 3.3 Unknown
CVE-2021-0264 2021-04-22 2024-11-21 5.9 5.0 Likely
CVE-2021-0273 2021-04-22 2024-11-21 5.3 5.0 Likely
CVE-2021-0288 2021-07-15 2024-11-21 6.5 3.3 Unknown
CVE-2021-0289 2021-07-15 2024-11-21 6.5 2.9 Unknown
CVE-2021-0290 2021-07-15 2024-11-21 6.5 3.3 Unknown
CVE-2021-31351 2021-10-19 2024-11-21 7.5 5.0 Likely
CVE-2021-31366 2021-10-19 2024-11-21 6.5 3.3 Unknown
CVE-2021-31369 2021-10-19 2024-11-21 5.3 4.3 Likely
CVE-2021-31379 2021-10-19 2024-11-21 7.5 4.3 Likely
CVE-2022-22153 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2022-22160 2022-01-19 2024-11-21 6.5 2.9 Unknown
CVE-2022-22175 2022-01-19 2024-11-21 7.5 4.3 Likely
CVE-2022-22178 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2022-22198 2022-04-14 2024-11-21 7.5 7.1 Likely
CVE-2022-22204 2022-07-20 2024-11-21 5.3 - -
CVE-2022-22207 2022-07-20 2024-11-21 7.5 - -
CVE-2022-22210 2022-07-20 2024-11-21 6.5 - -
CVE-2022-22236 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22249 2022-10-18 2024-11-21 6.5 - -
CVE-2023-22394 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22404 2023-01-13 2024-11-21 6.5 - -
CVE-2023-22409 2023-01-13 2024-11-21 5.5 - -
CVE-2023-22410 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22412 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22413 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22415 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22416 2023-01-13 2024-11-21 7.5 - -
CVE-2023-28974 2023-04-17 2024-11-21 7.4 - -
CVE-2023-28976 2023-04-17 2024-11-21 7.5 - -
CVE-2023-36832 2023-07-14 2024-11-21 7.5 - -
CVE-2023-28985 2023-07-14 2024-11-21 7.5 - -
CVE-2023-36848 2023-07-14 2024-11-21 6.5 - -
CVE-2023-36850 2023-07-14 2024-11-21 6.5 - -
CVE-2023-44193 2023-10-13 2024-11-21 5.5 - -
CVE-2023-44198 2023-10-13 2024-11-21 5.8 - -
CVE-2023-44199 2023-10-13 2024-11-21 7.5 - -
CVE-2024-21587 2024-01-12 2024-11-21 6.5 - -
CVE-2024-21607 2024-01-12 2024-11-21 5.3 - -
CVE-2024-21593 2024-04-12 2026-01-23 6.5 - -
CVE-2024-21609 2024-04-12 2025-04-10 6.5 - -
CVE-2024-21610 2024-04-12 2025-05-19 4.3 - -
CVE-2024-30391 2024-04-12 2025-04-11 4.8 - -
CVE-2024-30392 2024-04-12 2026-01-23 7.5 - -
CVE-2024-30401 2024-04-12 2026-01-23 5.9 - -
CVE-2024-30378 2024-04-16 2025-04-11 5.5 - -
CVE-2024-39518 2024-07-10 2025-03-03 7.5 - -
CVE-2024-39539 2024-07-11 2025-04-11 5.3 - -
CVE-2024-39540 2024-07-11 2025-04-11 7.5 - -
CVE-2024-39545 2024-07-11 2026-01-23 7.5 - -
CVE-2024-39550 2024-07-11 2025-09-04 6.5 - -
CVE-2024-39551 2024-07-11 2026-01-23 7.5 - -
CVE-2024-39526 2024-10-11 2026-01-23 6.5 - -
CVE-2024-47493 2024-10-11 2026-01-26 6.5 - -
CVE-2024-47496 2024-10-11 2026-01-26 5.5 - -
CVE-2024-47497 2024-10-11 2026-01-26 7.5 - -
CVE-2024-47501 2024-10-11 2026-01-26 5.5 - -
CVE-2025-21594 2025-04-09 2026-01-26 7.5 - -
CVE-2025-30647 2025-04-09 2026-01-26 6.5 - -
CVE-2025-30649 2025-04-09 2026-01-26 7.5 - -
CVE-2025-30656 2025-04-09 2026-01-23 7.5 - -
CVE-2025-30660 2025-04-09 2026-01-23 7.5 - -
CVE-2025-52952 2025-07-11 2026-01-26 6.5 - -
CVE-2025-52982 2025-07-11 2026-01-23 5.9 - -
CVE-2025-52960 2025-10-09 2026-01-23 5.9 - -
CVE-2025-60007 2026-01-15 2026-03-16 5.5 - -
CVE-2026-21905 2026-01-15 2026-01-23 7.5 - -
CVE-2026-21918 2026-01-15 2026-01-23 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for juniper mx960 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.