Home/Juniper/EX/EX3-BS310AC-SYS

EX3-BS310AC-SYS

Announced in: EX3 SRP MOD EX3 BS310AC SYS EX3 BS310DC SYS 512MB ERX 310

Juniper Chassis · EX Series

High confidence Official Juniper notice ↗ Verified
EX3-BS310AC-SYS is dead. Juniper support ended (-5908d). Last available for order .

Is the EX3-BS310AC-SYS still supported?

No. Juniper ended support for the EX3 SRP MOD EX3 BS310AC SYS EX3 BS310DC SYS 512MB ERX 310 on 2010-02-28. No further security fixes will be issued. See Juniper's lifecycle bulletin.

When does the EX3-BS310AC-SYS reach end of support?

Juniper support for the EX3 SRP MOD EX3 BS310AC SYS EX3 BS310DC SYS 512MB ERX 310 ends on 2010-02-28.

What replaces the EX3-BS310AC-SYS?

Juniper has not published a successor model for the EX3 SRP MOD EX3 BS310AC SYS EX3 BS310DC SYS 512MB ERX 310.

What known-exploited CVEs apply to the EX3-BS310AC-SYS past end of support?

7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform the EX3 SRP MOD EX3 BS310AC SYS EX3 BS310DC SYS 512MB ERX 310 runs. These will not be patched on this device because it is past the Juniper security-support date. See the Known Exploited Vulnerabilities table below for the full list.

Known Exploited Vulnerabilities

This device is past Juniper's security-support date. 7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform it runs. Juniper is not issuing patches for this model. Isolate, compensate, or refresh.

CVE KEV added Vulnerability Flags
CVE-2025-21590 Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability
CVE-2023-36844 Juniper Junos OS EX Series PHP External Variable Modification Vulnerability
CVE-2023-36845 Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability
CVE-2023-36846 Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
CVE-2023-36847 Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability
CVE-2023-36851 Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
CVE-2020-1631 Juniper Junos OS Path Traversal Vulnerability

Source: CISA Known Exploited Vulnerabilities catalog. The Ransomware flag reflects CISA's own knownRansomwareCampaignUse field, set when the CVE has been observed in ransomware campaigns per their threat intel. It's not a property of the vulnerability description itself.

Correlation is at the platform level, not per-OS-version. Not exhaustive: KEV only lists actively-exploited CVEs and many relevant unexploited vulnerabilities are not here. Verify against vendor security advisories (PSIRT, JSA, PAN-SA) and NVD before acting. See compensating controls if refresh isn't immediate.

EX3-BS310AC-SYS Lifecycle Overview

The Juniper EX3-BS310AC-SYS (EX3-BS310AC-SYS) is a chassis product in the Juniper EX series. This product has reached end of life as of , meaning Juniper no longer provides technical support, software updates, or hardware replacement for this product. It was last available for purchase on . Organizations still running the EX3-BS310AC-SYS should plan a migration .

Lifecycle Milestones

Lifecycle notice published 21y 8mo ago
End of sale 21y 2mo ago
Last date of support 16y 2mo ago

Additional Dates

Last Warranty Conversion Date 20y 2mo ago
Same Day Support Discontinued Date 19y 2mo ago
Next Day Support Discontinued Date 17y 2mo ago
Applicable Platforms
EX
↑ Top