Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
srx4100 Vendor: juniper

About This Product

srx4100 is a software product offered by juniper. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 116 known vulnerabilities affecting juniper srx4100. This includes 2 critical-severity issues and 76 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2015 to 2026, indicating a sustained research interest and ongoing security attention. 38 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-9708 2015-03-31 2025-04-12 - 5.0 Likely
CVE-2016-1285 2016-03-09 2025-04-12 6.8 4.3 Likely
CVE-2016-1286 2016-03-09 2025-04-12 8.6 5.0 Likely
CVE-2017-2341 2017-07-17 2025-04-20 8.8 7.2 Unknown
CVE-2017-10620 2017-10-13 2025-04-20 7.4 5.8 Likely
CVE-2018-0002 2018-01-10 2024-11-21 8.2 4.3 Likely
CVE-2018-0008 2018-01-10 2024-11-21 6.2 7.2 Unknown
CVE-2018-0009 2018-01-10 2024-11-21 5.4 4.3 Likely
CVE-2018-0018 2018-04-11 2024-11-21 7.5 4.3 Likely
CVE-2018-0020 2018-04-11 2024-11-21 7.5 7.8 Likely
CVE-2018-0024 2018-07-11 2024-11-21 7.8 7.2 Unknown
CVE-2018-0025 2018-07-11 2024-11-21 6.1 4.3 Likely
CVE-2018-0034 2018-07-11 2024-11-21 5.3 4.3 Likely
CVE-2018-15504 2018-08-18 2024-11-21 7.5 5.0 Likely
CVE-2018-0043 2018-10-10 2024-11-21 8.8 5.8 Unknown
CVE-2018-0045 2018-10-10 2024-11-21 8.8 5.8 Unknown
CVE-2018-0049 2018-10-10 2024-11-21 7.5 7.1 Likely
CVE-2019-0003 2019-01-15 2024-11-21 5.9 4.3 Likely
CVE-2019-0015 2019-01-15 2024-11-21 5.4 5.5 Likely
CVE-2017-3145 2019-01-16 2024-11-21 7.5 5.0 Likely
CVE-2019-0054 2019-10-09 2024-11-21 6.8 5.8 Likely
CVE-2019-0055 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0058 2019-10-09 2024-11-21 7.8 7.2 Unknown
CVE-2019-0060 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0062 2019-10-09 2024-11-21 7.5 6.8 Likely
CVE-2019-0066 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0068 2019-10-09 2024-11-21 6.5 5.0 Likely
CVE-2019-0075 2019-10-09 2024-11-21 7.5 5.0 Likely
CVE-2020-1601 2020-01-15 2024-11-21 5.3 5.0 Likely
CVE-2020-1606 2020-01-15 2024-11-21 5.4 6.5 Likely
CVE-2020-1607 2020-01-15 2024-11-21 7.5 4.3 Likely
CVE-2015-5361 2020-02-28 2024-11-21 6.5 5.8 Likely
CVE-2020-1613 2020-04-08 2024-11-21 8.6 5.0 Likely
CVE-2020-1634 2020-04-08 2024-11-21 7.5 4.3 Likely
CVE-2020-1661 2020-10-16 2024-11-21 5.3 4.3 Likely
CVE-2020-1682 2020-10-16 2024-11-21 5.5 2.1 Unknown
CVE-2020-1688 2020-10-16 2024-11-21 6.5 2.1 Unknown
CVE-2021-0206 2021-01-15 2024-11-21 7.5 5.0 Likely
CVE-2021-0208 2021-01-15 2024-11-21 8.8 3.3 Unknown
CVE-2021-0211 2021-01-15 2024-11-21 10.0 6.4 Likely
CVE-2021-0227 2021-04-22 2024-11-21 7.5 5.0 Likely
CVE-2021-0230 2021-04-22 2024-11-21 7.5 5.0 Likely
CVE-2021-0231 2021-04-22 2024-11-21 6.5 6.8 Likely
CVE-2021-0235 2021-04-22 2024-11-21 7.3 4.6 Unknown
CVE-2021-0244 2021-04-22 2024-11-21 7.4 4.3 Likely
CVE-2021-0246 2021-04-22 2024-11-21 7.3 4.6 Unknown
CVE-2021-0249 2021-04-22 2024-11-21 8.1 10.0 Likely
CVE-2021-0261 2021-04-22 2024-11-21 7.5 5.0 Likely
CVE-2021-0275 2021-04-22 2024-11-21 8.8 9.3 Likely
CVE-2021-0289 2021-07-15 2024-11-21 6.5 2.9 Unknown
CVE-2021-31373 2021-10-19 2024-11-21 8.0 3.5 Unknown
CVE-2021-31384 2021-10-19 2024-11-21 7.2 7.5 Likely
CVE-2022-22153 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2022-22167 2022-01-19 2024-11-21 7.2 6.8 Likely
CVE-2022-22175 2022-01-19 2024-11-21 7.5 4.3 Likely
CVE-2022-22178 2022-01-19 2024-11-21 7.5 5.0 Likely
CVE-2021-25220 2022-03-23 2024-11-21 6.8 4.0 Likely
CVE-2022-22185 2022-04-14 2024-11-21 7.5 5.0 Likely
CVE-2022-22198 2022-04-14 2024-11-21 7.5 7.1 Likely
CVE-2022-22204 2022-07-20 2024-11-21 5.3 - -
CVE-2022-22205 2022-07-20 2024-11-21 7.5 - -
CVE-2022-22206 2022-07-20 2024-11-21 7.5 - -
CVE-2022-22221 2022-07-20 2024-11-21 7.8 - -
CVE-2022-22201 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22218 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22231 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22232 2022-10-18 2024-11-21 7.5 - -
CVE-2022-22235 2022-10-18 2024-11-21 5.9 - -
CVE-2022-22236 2022-10-18 2024-11-21 7.5 - -
CVE-2023-22394 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22404 2023-01-13 2024-11-21 6.5 - -
CVE-2023-22409 2023-01-13 2024-11-21 5.5 - -
CVE-2023-22411 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22412 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22415 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22416 2023-01-13 2024-11-21 7.5 - -
CVE-2023-22417 2023-01-13 2024-11-21 7.5 - -
CVE-2023-28968 2023-04-17 2024-11-21 5.3 - -
CVE-2023-36831 2023-07-14 2024-11-21 7.5 - -
CVE-2023-28985 2023-07-14 2024-11-21 7.5 - -
CVE-2023-36838 2023-07-14 2024-11-21 5.5 - -
CVE-2023-36845 2023-08-17 2025-10-24 9.8 - -
CVE-2023-36846 2023-08-17 2026-02-26 5.3 - -
CVE-2023-36851 2023-09-27 2026-02-26 5.3 - -
CVE-2023-44198 2023-10-13 2024-11-21 5.8 - -
CVE-2024-21606 2024-01-12 2024-11-21 7.5 - -
CVE-2024-21619 2024-01-25 2024-11-21 5.3 - -
CVE-2024-21620 2024-01-25 2024-11-21 8.8 - -
CVE-2024-21609 2024-04-12 2025-04-10 6.5 - -
CVE-2024-30391 2024-04-12 2025-04-11 4.8 - -
CVE-2024-21586 2024-07-01 2026-01-22 7.5 - -
CVE-2024-39565 2024-07-10 2026-01-22 8.8 - -
CVE-2024-39529 2024-07-11 2024-11-21 7.5 - -
CVE-2024-39540 2024-07-11 2025-04-11 7.5 - -
CVE-2024-39545 2024-07-11 2026-01-23 7.5 - -
CVE-2024-39551 2024-07-11 2026-01-23 7.5 - -
CVE-2024-39527 2024-10-11 2026-01-23 5.5 - -
CVE-2024-47497 2024-10-11 2026-01-26 7.5 - -
CVE-2024-47506 2024-10-11 2026-01-26 5.9 - -
CVE-2025-21592 2025-01-09 2026-01-26 5.5 - -
CVE-2025-21596 2025-01-09 2026-01-26 5.5 - -
CVE-2025-30645 2025-04-09 2026-01-26 7.5 - -
CVE-2025-30656 2025-04-09 2026-01-23 7.5 - -
CVE-2025-30658 2025-04-09 2026-01-23 7.5 - -
CVE-2025-30659 2025-04-09 2026-01-23 7.5 - -
CVE-2025-52981 2025-07-11 2026-01-30 7.5 - -
CVE-2025-6549 2025-07-11 2026-01-23 6.5 - -
CVE-2025-52960 2025-10-09 2026-01-23 5.9 - -
CVE-2025-59968 2025-10-09 2026-01-23 8.6 - -
CVE-2025-60007 2026-01-15 2026-03-16 5.5 - -
CVE-2026-21905 2026-01-15 2026-01-23 7.5 - -
CVE-2026-21906 2026-01-15 2026-01-23 7.5 - -
CVE-2026-21914 2026-01-15 2026-01-23 7.5 - -
CVE-2026-21917 2026-01-15 2026-01-23 7.5 - -
CVE-2026-21918 2026-01-15 2026-01-23 7.5 - -
CVE-2026-21920 2026-01-15 2026-01-23 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for juniper srx4100 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.