Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
srx220 Vendor: juniper

About This Product

srx220 is a software product offered by juniper. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 94 known vulnerabilities affecting juniper srx220. This includes 3 critical-severity issues and 57 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2013 to 2024, indicating a sustained research interest and ongoing security attention. 34 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-4684 2013-07-11 2025-04-11 - 7.8 Likely
CVE-2013-4685 2013-07-11 2025-04-11 - 10.0 Likely
CVE-2013-4687 2013-07-11 2025-04-11 - 7.8 Likely
CVE-2013-4688 2013-07-11 2025-04-11 - 7.8 Likely
CVE-2013-6013 2013-10-17 2025-04-11 - 6.8 Likely
CVE-2013-6015 2013-10-17 2025-04-11 - 4.3 Likely
CVE-2014-0618 2014-01-11 2025-04-11 - 7.8 Likely
CVE-2014-0617 2014-01-15 2025-04-11 - 7.1 Likely
CVE-2014-0612 2014-04-14 2025-04-12 - 5.0 Likely
CVE-2014-3815 2014-07-11 2025-04-12 - 7.8 Likely
CVE-2014-3817 2014-07-11 2025-04-12 - 7.8 Likely
CVE-2014-3822 2014-07-11 2025-04-12 - 5.4 Unknown
CVE-2014-3825 2014-10-14 2025-04-12 - 6.8 Likely
CVE-2014-9708 2015-03-31 2025-04-12 - 5.0 Likely
CVE-2015-3002 2015-04-10 2025-04-12 - 6.9 Unknown
CVE-2015-3005 2015-04-10 2025-04-12 - 4.3 Likely
CVE-2015-5363 2015-07-16 2025-04-12 - 5.0 Likely
CVE-2016-1285 2016-03-09 2025-04-12 6.8 4.3 Likely
CVE-2016-1286 2016-03-09 2025-04-12 8.6 5.0 Likely
CVE-2017-10605 2017-07-17 2025-04-20 8.6 5.0 Likely
CVE-2017-2343 2017-07-17 2025-04-20 10.0 10.0 Likely
CVE-2017-10608 2017-10-13 2025-04-20 7.5 5.0 Likely
CVE-2017-10620 2017-10-13 2025-04-20 7.4 5.8 Likely
CVE-2018-0002 2018-01-10 2024-11-21 8.2 4.3 Likely
CVE-2018-0008 2018-01-10 2024-11-21 6.2 7.2 Unknown
CVE-2018-0009 2018-01-10 2024-11-21 5.4 4.3 Likely
CVE-2018-0018 2018-04-11 2024-11-21 7.5 4.3 Likely
CVE-2018-0020 2018-04-11 2024-11-21 7.5 7.8 Likely
CVE-2018-0024 2018-07-11 2024-11-21 7.8 7.2 Unknown
CVE-2018-0025 2018-07-11 2024-11-21 6.1 4.3 Likely
CVE-2018-0034 2018-07-11 2024-11-21 5.3 4.3 Likely
CVE-2018-15504 2018-08-18 2024-11-21 7.5 5.0 Likely
CVE-2018-0045 2018-10-10 2024-11-21 8.8 5.8 Unknown
CVE-2018-0049 2018-10-10 2024-11-21 7.5 7.1 Likely
CVE-2019-0003 2019-01-15 2024-11-21 5.9 4.3 Likely
CVE-2019-0010 2019-01-15 2024-11-21 7.5 5.0 Likely
CVE-2019-0015 2019-01-15 2024-11-21 5.4 5.5 Likely
CVE-2017-3145 2019-01-16 2024-11-21 7.5 5.0 Likely
CVE-2019-0033 2019-04-10 2024-11-21 7.5 5.0 Likely
CVE-2019-0054 2019-10-09 2024-11-21 6.8 5.8 Likely
CVE-2019-0055 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0058 2019-10-09 2024-11-21 7.8 7.2 Unknown
CVE-2019-0060 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0062 2019-10-09 2024-11-21 7.5 6.8 Likely
CVE-2019-0066 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0068 2019-10-09 2024-11-21 6.5 5.0 Likely
CVE-2019-0075 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2020-1601 2020-01-15 2024-11-21 5.3 5.0 Likely
CVE-2020-1606 2020-01-15 2024-11-21 5.4 6.5 Likely
CVE-2020-1607 2020-01-15 2024-11-21 7.5 4.3 Likely
CVE-2015-5361 2020-02-28 2024-11-21 6.5 5.8 Likely
CVE-2020-1613 2020-04-08 2024-11-21 8.6 5.0 Likely
CVE-2021-0211 2021-01-15 2024-11-21 10.0 6.4 Likely
CVE-2021-0227 2021-04-22 2024-11-21 7.5 5.0 Likely
CVE-2021-0230 2021-04-22 2024-11-21 7.5 5.0 Likely
CVE-2021-0289 2021-07-15 2024-11-21 6.5 2.9 Unknown
CVE-2021-31373 2021-10-19 2024-11-21 8.0 3.5 Unknown
CVE-2022-22153 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2022-22167 2022-01-19 2024-11-21 7.2 6.8 Likely
CVE-2022-22175 2022-01-19 2024-11-21 7.5 4.3 Likely
CVE-2022-22178 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2021-25220 2022-03-23 2024-11-21 6.8 4.0 Likely
CVE-2022-22185 2022-04-14 2024-11-21 7.5 5.0 Likely
CVE-2022-22198 2022-04-14 2024-11-21 7.5 7.1 Likely
CVE-2022-22204 2022-07-20 2024-11-21 5.3 - -
CVE-2022-22205 2022-07-20 2024-11-21 7.5 - -
CVE-2022-22206 2022-07-20 2024-11-21 7.5 - -
CVE-2022-22221 2022-07-20 2024-11-21 7.8 - -
CVE-2022-22218 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22232 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22235 2022-10-18 2024-11-21 5.9 - -
CVE-2022-22236 2022-10-18 2024-11-21 7.5 - -
CVE-2023-22394 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22404 2023-01-13 2024-11-21 6.5 - -
CVE-2023-22409 2023-01-13 2024-11-21 5.5 - -
CVE-2023-22411 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22412 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22415 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22416 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22417 2023-01-13 2024-11-21 7.5 - -
CVE-2023-28968 2023-04-17 2024-11-21 5.3 - -
CVE-2023-36831 2023-07-14 2024-11-21 7.5 - -
CVE-2023-28985 2023-07-14 2024-11-21 7.5 - -
CVE-2023-36838 2023-07-14 2024-11-21 5.5 - -
CVE-2023-36845 2023-08-17 2025-10-24 9.8 - -
CVE-2023-36846 2023-08-17 2026-02-26 5.3 - -
CVE-2023-36851 2023-09-27 2026-02-26 5.3 - -
CVE-2024-21606 2024-01-12 2024-11-21 7.5 - -
CVE-2024-21619 2024-01-25 2024-11-21 5.3 - -
CVE-2024-21620 2024-01-25 2024-11-21 8.8 - -
CVE-2024-21609 2024-04-12 2025-04-10 6.5 - -
CVE-2024-30391 2024-04-12 2025-04-11 4.8 - -
CVE-2024-39529 2024-07-11 2024-11-21 7.5 - -
CVE-2024-39540 2024-07-11 2025-04-11 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for juniper srx220 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.