{"vulnerability": "CVE-2025-2159", "sightings": [{"uuid": "4a755f2c-d5ca-4250-ba9e-1407c16031f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lfopttrcyk2t", "content": "", "creation_timestamp": "2025-01-14T07:24:30.848524Z"}, {"uuid": "3bc556cc-4eef-4cbb-a28b-aa0ced80dc3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21592", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799387341626315", "content": "", "creation_timestamp": "2025-01-09T16:40:47.623572Z"}, {"uuid": "d0f5e693-a90e-4def-945c-74fb0027ac95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lfopum5zg22t", "content": "", "creation_timestamp": "2025-01-14T07:24:56.615800Z"}, {"uuid": "9ba7c162-db71-479f-b8a8-6b2d3ab46610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21593", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799417654408280", "content": "", "creation_timestamp": "2025-01-09T16:48:29.881351Z"}, {"uuid": "55572250-ac5e-4f2a-b948-dbb4f941979c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21596", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799417669512398", "content": "", "creation_timestamp": "2025-01-09T16:48:30.264259Z"}, {"uuid": "0a4d281a-ecbe-49af-835f-d8b59eca0af4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799417683833601", "content": "", "creation_timestamp": "2025-01-09T16:48:30.450017Z"}, {"uuid": "64055739-428a-4796-866e-afbba67e29a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21592", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd6jz6iaw2k", "content": "", "creation_timestamp": "2025-01-09T17:15:29.839606Z"}, {"uuid": "bae004f9-d243-4c94-b7e3-a31d0013b11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21593", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd6k3m4ux27", "content": "", "creation_timestamp": "2025-01-09T17:15:32.055085Z"}, {"uuid": "cb632357-86af-40af-9ae5-85a68a4187fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21596", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd6k5xgcg22", "content": "", "creation_timestamp": "2025-01-09T17:15:34.942794Z"}, {"uuid": "139d151e-d373-4c52-9a29-628ee7e9103c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfd6kb3fkl25", "content": "", "creation_timestamp": "2025-01-09T17:15:37.824898Z"}, {"uuid": "4042d736-6553-4a11-9b55-3d82c2bd734f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21596", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfd7tg7ath2y", "content": "", "creation_timestamp": "2025-01-09T17:38:39.478104Z"}, {"uuid": "f989e8c9-8bf3-433a-bdc4-3c1473532a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfd7tgm6gx2q", "content": "", "creation_timestamp": "2025-01-09T17:38:40.131224Z"}, {"uuid": "4fe4df4d-0c2c-460f-9981-03782ffa74cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21593", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfd7tgprr62g", "content": "", "creation_timestamp": "2025-01-09T17:38:40.623960Z"}, {"uuid": "5e74d00d-1208-4af0-942f-2dcda84be244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21592", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfd7tgtq7s2i", "content": "", "creation_timestamp": "2025-01-09T17:38:41.127326Z"}, {"uuid": "f420043f-9ad3-42a8-a6c4-1b2eeff29d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfps6pzhni2n", "content": "", "creation_timestamp": "2025-01-14T17:39:03.448703Z"}, {"uuid": "fabccaab-b3de-41d5-9e66-3e9f3ab4cb26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfps6pzhni2n", "content": "", "creation_timestamp": "2025-01-14T17:39:03.495996Z"}, {"uuid": "0666264d-05e9-4280-ae00-1ce47f6ce2af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799784040976407", "content": "", "creation_timestamp": "2025-01-09T18:21:40.654656Z"}, {"uuid": "16fffe60-2e6c-4ad8-89d1-cf6273e2ddbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-21598", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfo73ybxhk2z", "content": "", "creation_timestamp": "2025-01-14T02:24:49.904048Z"}, {"uuid": "6840f319-316d-4138-868e-afb732272b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-21599", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfo73ybxhk2z", "content": "", "creation_timestamp": "2025-01-14T02:24:49.954040Z"}, {"uuid": "bfc5fd9c-42f7-46a5-b834-a55ec62d149e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdfchvtxc2l", "content": "", "creation_timestamp": "2025-01-09T19:16:32.648884Z"}, {"uuid": "7245874b-a261-4b3d-aff1-57d08a645c77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113805137022336169", "content": "", "creation_timestamp": "2025-01-10T17:03:00.857227Z"}, {"uuid": "c36fdb81-8c8c-43c8-91c0-13cb7e5461de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113805139000724848", "content": "", "creation_timestamp": "2025-01-10T17:03:30.880530Z"}, {"uuid": "57d723a9-b7a9-4a97-b865-cc299f0a0604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfog3n4ytk22", "content": "", "creation_timestamp": "2025-01-14T04:29:58.642352Z"}, {"uuid": "db2a8441-3f01-42ad-90fd-85aec4f9bd85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfog3n4ytk22", "content": "", "creation_timestamp": "2025-01-14T04:29:58.700692Z"}, {"uuid": "a4c32c05-a9e4-4187-bda4-f68bd1a4ed39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkegdrmwfa2f", "content": "", "creation_timestamp": "2025-03-14T20:13:48.113930Z"}, {"uuid": "42b02a55-0272-4822-bd54-a8e54f1532e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-25T08:06:32.000000Z"}, {"uuid": "50496f73-7451-4cfa-a4da-2552fd7833a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-13T18:10:02.000000Z"}, {"uuid": "632095e2-4513-462f-afe5-693ab74623ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "MISP/203b558b-93ca-4b18-bf37-d528e6cebb50", "content": "", "creation_timestamp": "2025-03-25T21:08:40.000000Z"}, {"uuid": "4066e538-ed3e-4955-82fb-29df8322d44c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114172354045107756", "content": "", "creation_timestamp": "2025-03-16T13:31:11.434095Z"}, {"uuid": "0d1f8387-6a5e-46b3-8608-6ccf35b97a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/it-connect.bsky.social/post/3lkdld44gpe24", "content": "", "creation_timestamp": "2025-03-14T12:10:15.789274Z"}, {"uuid": "2b6a4c80-d090-4daf-bed1-e39551b2cf67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lkej27bgyg2t", "content": "", "creation_timestamp": "2025-03-14T21:02:10.431207Z"}, {"uuid": "4931b736-207b-4a66-b38b-0fde1090b4b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkcnh52bq22m", "content": "", "creation_timestamp": "2025-03-14T03:15:39.330001Z"}, {"uuid": "9a792114-1422-42c0-b549-faae1ca60dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-21590", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lkd2okbtp227", "content": "", "creation_timestamp": "2025-03-14T07:12:25.259757Z"}, {"uuid": "3e80777c-1ce3-4c09-b109-79d0f34173f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfitlds6s23", "content": "", "creation_timestamp": "2025-03-15T06:31:08.743953Z"}, {"uuid": "79c63ce6-a5f0-4c88-8505-824f84e13056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfk2g75rs23", "content": "", "creation_timestamp": "2025-03-15T06:52:51.618332Z"}, {"uuid": "21e12bc2-2031-4146-8e13-62c68c316eaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfkadfpus23", "content": "", "creation_timestamp": "2025-03-15T06:56:09.527451Z"}, {"uuid": "a473f40f-3f25-407c-9539-978efa101958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfkn3kry223", "content": "", "creation_timestamp": "2025-03-15T07:03:18.082023Z"}, {"uuid": "cfab6bde-4759-4741-b41c-b1f2a72ba63e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3560180", "content": "", "creation_timestamp": "2025-03-13T15:13:15.317257Z"}, {"uuid": "b6d21854-e7f1-4474-96b5-e5a99509d581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lkbzlk6jhs2s", "content": "", "creation_timestamp": "2025-03-13T21:20:11.069211Z"}, {"uuid": "267e7621-c827-4d28-a760-a5ea30085cb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/xc0py.bsky.social/post/3lkg7glhd5c2y", "content": "", "creation_timestamp": "2025-03-15T13:15:25.852309Z"}, {"uuid": "b8aa3493-e9be-49e0-9021-caf631e1b5d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lkbyl6hn5i2s", "content": "", "creation_timestamp": "2025-03-13T21:02:05.072783Z"}, {"uuid": "91e30eae-7cbe-42b7-87ec-56846e6fb986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21594", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114309777091248159", "content": "", "creation_timestamp": "2025-04-09T19:59:37.212888Z"}, {"uuid": "da92d6f2-3523-417e-bcd4-6f5db7cb3074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21591", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114309777091248159", "content": "", "creation_timestamp": "2025-04-09T19:59:37.328378Z"}, {"uuid": "69fbcfb9-361c-4283-be1b-582c99fd5d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21594", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114309916508212730", "content": "", "creation_timestamp": "2025-04-09T20:35:04.142800Z"}, {"uuid": "7954cd1f-0d0e-418b-b9ac-cef4b601ba4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mgdbmu3ox42s", "content": "", "creation_timestamp": "2026-03-05T17:02:09.894849Z"}, {"uuid": "09dd62f0-e3f9-4bf0-a18e-525bae037331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3mgesbtct322n", "content": "", "creation_timestamp": "2026-03-06T07:32:53.846195Z"}, {"uuid": "491890d3-f018-4059-83b6-b01361bc6791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://gist.github.com/alon710/cac97ba014db9691de0980826241e1be", "content": "", "creation_timestamp": "2026-01-24T21:30:33.000000Z"}, {"uuid": "d2d5a388-d771-4842-8029-58483e1999cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://gist.github.com/alon710/5d2cd731f3c8e2a46a15dd8315e7de0d", "content": "", "creation_timestamp": "2026-01-24T21:30:34.000000Z"}, {"uuid": "3a256d2b-5e79-4461-9100-4e2e44ae533a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://gist.github.com/alon710/f1f9a3b373fd7e4ae2c05044d74ef92b", "content": "", "creation_timestamp": "2026-01-24T22:42:35.000000Z"}, {"uuid": "618f01fb-356e-4203-87a1-33165385ba8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21599\n\ud83d\udd39 Description: A\u00a0Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.\u00a0\n\nReceipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS).\u00a0Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition.\nThis issue only affects systems configured with IPv6.\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n  *  from 22.4-EVO before 22.4R3-S5-EVO,\u00a0\n  *  from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n  *  from 23.4-EVO before 23.4R2-S2-EVO,\u00a0\n  *  from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO.\n\ud83d\udccf Published: 2025-01-09T16:46:57.412Z\n\ud83d\udccf Modified: 2025-01-09T16:46:57.412Z\n\ud83d\udd17 References:\n1. https://supportportal.juniper.net/JSA92869", "creation_timestamp": "2025-01-09T17:21:06.000000Z"}, {"uuid": "415009b8-8239-4db3-8b95-7a20b2bb060b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-21590", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f49c7a43-e154-43c6-9df4-c52f7ee2af40", "content": "", "creation_timestamp": "2026-02-02T12:26:05.634561Z"}, {"uuid": "de9d846e-64a4-48cf-a078-ce3a3d3cbbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21591", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13712", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21591\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: A Buffer Access with Incorrect Length Value vulnerability in the jdhcpd daemon of Juniper Networks Junos OS, when DHCP snooping is enabled, allows an unauthenticated, adjacent, attacker to send a DHCP packet with a malformed DHCP option to cause jdhcp to crash creating a Denial of Service (DoS) condition.\n\nContinuous receipt of these DHCP packets using the malformed DHCP Option will create a sustained Denial of Service (DoS) condition.\n\n\nThis issue affects Junos OS:\n\n\n\n  *  from 23.1 before 23.2R2-S3,\n  *  from 23.4 before 23.4R2-S3,\n  *  from 24.2 before 24.2R2.\n\n\nThis issue isn't applicable to any versions of Junos OS before 23.1R1. \n\n\n\nThis issue doesn't affect vSRX Series which doesn't support DHCP Snooping. \n\nThis issue doesn't affect Junos OS Evolved.\n\nThere are no indicators of compromise for this issue.\n\ud83d\udccf Published: 2025-04-09T19:46:55.976Z\n\ud83d\udccf Modified: 2025-04-28T16:21:26.535Z\n\ud83d\udd17 References:\n1. https://supportportal.juniper.net/JSA96448", "creation_timestamp": "2025-04-28T17:10:44.000000Z"}, {"uuid": "9282d5ca-064f-4929-a01d-db021c72a1d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7301", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21590\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device.\n\nA local attacker with access to the shell is able to inject arbitrary code which can compromise an affected device.\nThis issue is not exploitable from the Junos CLI.\nThis issue affects Junos OS:\u00a0\n\n\n\n  *  All versions before 21.2R3-S9,\n  *  21.4 versions before 21.4R3-S10,\u00a0\n  *  22.2 versions before 22.2R3-S6,\u00a0\n  *  22.4 versions before 22.4R3-S6,\u00a0\n  *  23.2 versions before 23.2R2-S3,\u00a0\n  *  23.4 versions before 23.4R2-S4,\n  *  24.2 versions before 24.2R1-S2, 24.2R2.\n\ud83d\udccf Published: 2025-03-12T13:59:43.038Z\n\ud83d\udccf Modified: 2025-03-12T14:30:12.809Z\n\ud83d\udd17 References:\n1. https://supportportal.juniper.net/JSA93446\n2. https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers", "creation_timestamp": "2025-03-12T14:40:35.000000Z"}, {"uuid": "34de2325-2c30-4846-83a0-a61d373c47c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11027", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21590\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device.\n\nA local attacker with access to the shell is able to inject arbitrary code which can compromise an affected device.\nThis issue is not exploitable from the Junos CLI.\nThis issue affects Junos OS:\u00a0\n\n\n\n  *  All versions before 21.2R3-S9,\n  *  21.4 versions before 21.4R3-S10,\u00a0\n  *  22.2 versions before 22.2R3-S6,\u00a0\n  *  22.4 versions before 22.4R3-S6,\u00a0\n  *  23.2 versions before 23.2R2-S3,\u00a0\n  *  23.4 versions before 23.4R2-S4,\n  *  24.2 versions before 24.2R1-S2, 24.2R2.\n\ud83d\udccf Published: 2025-03-12T13:59:43.038Z\n\ud83d\udccf Modified: 2025-04-09T08:37:31.080Z\n\ud83d\udd17 References:\n1. https://supportportal.juniper.net/JSA93446\n2. https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers", "creation_timestamp": "2025-04-09T08:48:59.000000Z"}, {"uuid": "7c491dd2-ce23-4b4e-a52f-b426da170b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2159", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2159\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Stored XSS in Desktop UI in M-Files Server Admin tool before version 25.3.14681.7 on Windows allows authenticated local user to run scripts via UI\n\ud83d\udccf Published: 2025-04-04T06:06:48.568Z\n\ud83d\udccf Modified: 2025-04-04T06:06:48.568Z\n\ud83d\udd17 References:\n1. https://product.m-files.com/security-advisories/cve-2025-2159/", "creation_timestamp": "2025-04-04T06:35:23.000000Z"}, {"uuid": "bbefd5ff-46c5-41a4-8976-a9562a55bf57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://t.me/CyberBulletin/2069", "content": "\u26a1\ufe0fUnauthenticated Attackers Can Exploit Junos Vulnerabilities (CVE-2025-21598 &amp; CVE-2025-21599).\n\n#CyberBulletin", "creation_timestamp": "2025-01-14T12:38:55.000000Z"}, {"uuid": "312d63e4-5f53-4db8-b838-446523b1e60e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://t.me/CyberBulletin/2069", "content": "\u26a1\ufe0fUnauthenticated Attackers Can Exploit Junos Vulnerabilities (CVE-2025-21598 &amp; CVE-2025-21599).\n\n#CyberBulletin", "creation_timestamp": "2025-01-14T12:38:55.000000Z"}, {"uuid": "78dac892-c2fa-4fd4-ae5f-22c70171f5c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2159", "type": "seen", "source": "https://t.me/cvedetector/22096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2159 - M-Files Server Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2159 \nPublished : April 4, 2025, 6:15 a.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Stored XSS in Desktop UI in M-Files Server Admin tool before version 25.3.14681.7 on Windows allows authenticated local user to run scripts via UI \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T10:29:32.000000Z"}, {"uuid": "6fddeb8e-e02e-4210-aec1-60267b450d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21590", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1053", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0647\u0633\u062a\u0647 Juniper Networks Junos OS \u0628\u0647 \u062f\u0644\u06cc\u0644 \u062c\u062f\u0627\u0633\u0627\u0632\u06cc \u0641\u0636\u0627\u06cc\u06cc \u0646\u0627\u06a9\u0627\u0641\u06cc \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 \u06cc\u06a9 \u0641\u0627\u06cc\u0644 \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0627\u0635\u060c \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2025-02715\nCVE-2025-21590\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0622\u0646\u062a\u06cc \u0648\u06cc\u0631\u0648\u0633 \u0628\u0631\u0627\u06cc \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0627\u0632 \u062a\u0644\u0627\u0634 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc SIEM \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u062a\u0644\u0627\u0634 \u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0645\u062d\u06cc\u0637 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u0628\u0633\u062a\u0647 \u0628\u0631\u0627\u06cc \u06a9\u0627\u0631 \u0628\u0627 \u0641\u0627\u06cc\u0644 \u0647\u0627\u06cc \u062f\u0631\u06cc\u0627\u0641\u062a \u0634\u062f\u0647 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0646\u0627\u0645\u0639\u062a\u0628\u0631.\n- \u0628\u0647 \u062d\u062f\u0627\u0642\u0644 \u0631\u0633\u0627\u0646\u062f\u0646 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u06a9\u0627\u0631\u0628\u0631\u061b\n- \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646/\u062d\u0630\u0641 \u062d\u0633\u0627\u0628 \u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0634\u062f\u0647\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590USGU?\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-03-24T17:01:55.000000Z"}, {"uuid": "f937d96c-3c6b-454f-8379-b10cd457f305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21597", "type": "seen", "source": "https://t.me/cvedetector/22604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21597 - Juniper Networks Junos OS and Junos OS Evolved BGP Peer Flapping Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21597 \nPublished : April 9, 2025, 8:15 p.m. | 24\u00a0minutes ago \nDescription : An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS).  \n  \nOn all Junos OS and Junos OS Evolved platforms, when BGP rib-sharding and update-threading are configured, and a BGP peer flap is done with specific timing, rpd crashes and restarts. Continuous peer flapping at specific time intervals will result in a sustained Denial of Service (DoS) condition.  \n  \nThis issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations.  This issue requires a remote attacker to have at least one established BGP session. The issue can occur with or without logical-systems enabled.  \n  \nThis issue affects:  \nJunos OS:  \n  \n  \n  \n  *  All versions before 20.4R3-S8,  \n  *  21.2 versions before 21.2R3-S6,  \n  \n  *  21.3 versions before 21.3R3-S5,  \n  *  21.4 versions before 21.4R3-S4,  \n  *  22.1 versions before 22.1R3-S3,  \n  *  22.2 versions before 22.2R3-S1,  \n  *  22.3 versions before 22.3R3,  \n  *  22.4 versions before 22.4R3.  \n  \n  \nJunos OS Evolved:  \n  \n  \n  \n  *  All versions before 21.2R3-S6-EVO,  \n  *  21.3-EVO versions before 21.3R3-S5-EVO,  \n  *  21.4-EVO versions before 21.4R3-S4-EVO,  \n  *  22.1-EVO versions before 22.1R3-S3-EVO,  \n  *  22.2-EVO versions before :22.2R3-S1-EVO,  \n  *  22.3-EVO versions before 22.3R3-EVO,  \n  *  22.4-EVO versions before 22.4R3-EVO. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T23:28:22.000000Z"}, {"uuid": "0ed60103-a474-45bd-9f63-2091f0b067fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://t.me/cvedetector/14881", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21598 - Juniper Networks Junos OS and Junos OS Evolved BGP OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21598 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : An\u00a0Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send\u00a0malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.  \nThis issue affects:  \n  \nJunos OS:\u00a0  \n  \n  \n  \n  *  from 21.2R3-S8 before 21.2R3-S9,\u00a0  \n  *  from 21.4R3-S7 before 21.4R3-S9,\u00a0  \n  *  from 22.2R3-S4 before 22.2R3-S5,\u00a0  \n  *  from 22.3R3-S2 before 22.3R3-S4,\u00a0  \n  *  from 22.4R3 before 22.4R3-S5,\u00a0  \n  *  from 23.2R2 before 23.2R2-S2,\u00a0  \n  *  from 23.4R1 before 23.4R2-S1,\u00a0  \n  *  from 24.2R1 before 24.2R1-S1, 24.2R2.  \n  \n  \nJunos OS Evolved:  \n  *  from 21.4R3-S7-EVO before 21.4R3-S9-EVO,\u00a0  \n  *  from 22.2R3-S4-EVO before 22.2R3-S5-EVO,\u00a0  \n  *  from 22.3R3-S2-EVO before 22.3R3-S4-EVO,\u00a0  \n  *  from 22.4R3-EVO before 22.4R3-S5-EVO,\u00a0  \n  *  from 23.2R2-EVO before 23.2R2-S2-EVO,\u00a0  \n  *  from 23.4R1-EVO before 23.4R2-S1-EVO,\u00a0  \n  *  from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.  \n  \n  \nThis issue requires a BGP session to be established.  \n  \nThis issue can propagate and multiply through multiple ASes until reaching vulnerable devices.  \n  \nThis issue affects iBGP and eBGP.  \n  \nThis issue affects IPv4 and IPv6.  \n  \nAn indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue:  \n  \nFor example, by issuing the command on the neighboring device:  \n\u00a0show log messages  \n  \nReviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:  \n\u00a0 rpd[]: Received malformed update from  (External AS )  \nand  \n\u00a0 rpd[]: Malformed Attribute \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:48.000000Z"}, {"uuid": "0263fe2a-229d-4f9d-ba76-d4f71d2f765c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://t.me/cvedetector/14878", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21599 - Juniper Networks Junos OS Evolved IPv6 Malformed Packet Memory Exhaustion Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-21599 \nPublished : Jan. 9, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : A\u00a0Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.\u00a0  \n  \nReceipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS).\u00a0Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition.  \nThis issue only affects systems configured with IPv6.  \n  \nThis issue affects Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  from 22.4-EVO before 22.4R3-S5-EVO,\u00a0  \n  *  from 23.2-EVO before 23.2R2-S2-EVO,\u00a0  \n  *  from 23.4-EVO before 23.4R2-S2-EVO,\u00a0  \n  *  from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.  \n  \n  \n  \n  \nThis issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T19:26:33.000000Z"}, {"uuid": "3ec01015-c1ab-499f-ab11-4b01b7347acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21596", "type": "seen", "source": "https://t.me/cvedetector/14877", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21596 - Juniper Networks Junos OS SRX1500, SRX4100, SRX4200 Denial of Service (DoS) Command Injectionunga\", \n  \"Content\": \"CVE ID : CVE-2025-21596 \nPublished : Jan. 9, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system.  \n  \nThis issue affects Junos OS on SRX1500, SRX4100, SRX4200:\u00a0  \n  \n  \n  \n  *  All versions before 21.4R3-S9,\u00a0  \n  *  from 22.2 before 22.2R3-S5,\u00a0  \n  *  from 22.3 before 22.3R3-S4,\u00a0  \n  *  from 22.4 before 22.4R3-S4,\u00a0  \n  *  from 23.2 before 23.2R2-S3,\u00a0  \n  *  from 23.4 before 23.4R2-S1. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T19:26:30.000000Z"}, {"uuid": "02103d11-120e-4890-b9fc-ded52d5d2c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21593", "type": "seen", "source": "https://t.me/cvedetector/14876", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21593 - \"Juniper Networks Junos OS and Junos OS Evolved SRv6 BGP UPDATE Packet Denial-of-Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-21593 \nPublished : Jan. 9, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS).  \n  \nOn devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet which will cause the rpd to crash and restart. Continued receipt of these UPDATE packets will cause a sustained DoS condition.\u00a0  \n  \nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects Junos OS:\u00a0  \n  \n  \n  \n  *  All versions before 21.2R3-S9,\u00a0  \n  *  from 21.4 before 21.4R3-S10,\u00a0  \n  *  from 22.2 before 22.2R3-S5,\u00a0  \n  *  from 22.3 before 22.3R3-S4,\u00a0  \n  *  from 22.4 before 22.4R3-S3,\u00a0  \n  *  from 23.2 before 23.2R2-S2,\u00a0  \n  *  from 23.4 before 23.4R2;  \n  \n  \n  \nand Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  All versions before 21.2R3-S9-EVO,\u00a0  \n  *  from 21.4-EVO before 21.4R3-S10-EVO,\u00a0  \n  *  from 22.2-EVO before 22.2R3-S5-EVO,\u00a0  \n  *  from 22.3-EVO before 22.3R3-S4-EVO,\u00a0  \n  *  from 22.4-EVO before 22.4R3-S3-EVO,  \n  *  from 23.2-EVO before 23.2R2-S2-EVO,\u00a0  \n  *  from 23.4-EVO before 23.4R2-EVO. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T19:26:29.000000Z"}, {"uuid": "62b14575-d17d-4653-8ed9-f4c674ccbb29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21592", "type": "seen", "source": "https://t.me/cvedetector/14875", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21592 - Juniper Networks Junos OS SRX Series Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21592 \nPublished : Jan. 9, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : An Exposure of Sensitive Information to an Unauthorized Actor\u00a0vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.  \n  \nThrough the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.  \n  \n  \nThis issue affects Junos OS SRX Series:  \n  \n  \n  \n  *  All versions before 21.4R3-S8,  \n  \n  *  from 22.2 before 22.2R3-S5,  \n  \n  *  from 22.3 before 22.3R3-S3,  \n  *  from 22.4 before 22.4R3-S2,  \n  \n  *  from 23.2 before 23.2R2-S1,  \n  \n  *  from 23.4 before 23.4R2. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T19:26:28.000000Z"}, {"uuid": "a538ec8e-89ef-47ce-a811-bb20f1ed1aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21599", "type": "seen", "source": "https://t.me/true_secator/6617", "content": "Juniper Networks \u043d\u0430\u0447\u0438\u043d\u0430\u0435\u0442 2025 \u0433\u043e\u0434 \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0445 \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 Junos OS, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043a\u043e\u043a.\n\n\u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0434\u0435\u043c\u043e\u043d\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 (RPD) Junos OS \u0438 Junos OS Evolved, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a DoS \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430 BGP.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-21598 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u044b \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0442\u0440\u0430\u0441\u0441\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u0440\u0438\u0435\u043c\u0430 \u043f\u0430\u043a\u0435\u0442\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e AS, \u043f\u043e\u043a\u0430 \u043d\u0435 \u0434\u043e\u0441\u0442\u0438\u0433\u043d\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u0431\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0443\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u043e\u043f\u0446\u0438\u0438 \u0442\u0440\u0430\u0441\u0441\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432. \u0414\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0438\u0441\u043a\u0430\u0442\u044c \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043e\u0431 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u0445 \u0432 \u0441\u043e\u0441\u0435\u0434\u043d\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 AS, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-21599 - \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Juniper Tunnel Driver (JTD) \u041e\u0421 Junos Evolved, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u043f\u043e \u0441\u0435\u0442\u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u0432\u044b\u0437\u043e\u0432\u0430 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f DoS.\n\n\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 IPv6, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043f\u0430\u043c\u044f\u0442\u044c \u044f\u0434\u0440\u0430 \u043d\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0435\u0435 \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u044e. \u041d\u0435\u043f\u0440\u0435\u0440\u044b\u0432\u043d\u043e\u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u044d\u0442\u0438\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0431\u0443\u0434\u0443\u0442 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0442\u044c \u0438\u0441\u0442\u043e\u0449\u0430\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u044c \u044f\u0434\u0440\u0430, \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u044f \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0435 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 DoS.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 OpenSSH, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 Junos OS \u0438 Junos OS Evolved, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043a\u0430\u043a CVE-2024-6387 (regreSSHion) \u0438 CVE-2024-39894.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Juniper \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0435 Junos Space 24.1R2 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u043e\u0447\u0442\u0438 60 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 Expat (libexpat), \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 XML-\u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u0430.\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u0447\u0438\u0441\u043b\u043e \u043e\u0448\u0438\u0431\u043e\u043a \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 Junos OS \u0438 Junos OS Evolved, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u043b\u0438 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a DoS-\u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f\u043c \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u041d\u0438 \u043e\u0434\u043d\u0430 \u0438\u0437 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e-\u0432\u0438\u0434\u0438\u043c\u043e\u043c\u0443, \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445, \u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435\u0440\u0435\u0434\u043a\u043e\u00a0\u043d\u0430\u0446\u0435\u043b\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u044b \u0441 \u041e\u0421 Junos.", "creation_timestamp": "2025-01-14T13:40:05.000000Z"}, {"uuid": "e021a559-e628-46f5-abe5-1a23a0c7baf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21598", "type": "seen", "source": "https://t.me/true_secator/6617", "content": "Juniper Networks \u043d\u0430\u0447\u0438\u043d\u0430\u0435\u0442 2025 \u0433\u043e\u0434 \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0445 \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 Junos OS, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043a\u043e\u043a.\n\n\u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0434\u0435\u043c\u043e\u043d\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 (RPD) Junos OS \u0438 Junos OS Evolved, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a DoS \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430 BGP.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-21598 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u044b \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u0442\u0440\u0430\u0441\u0441\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u0440\u0438\u0435\u043c\u0430 \u043f\u0430\u043a\u0435\u0442\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e AS, \u043f\u043e\u043a\u0430 \u043d\u0435 \u0434\u043e\u0441\u0442\u0438\u0433\u043d\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u0431\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0443\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u043e\u043f\u0446\u0438\u0438 \u0442\u0440\u0430\u0441\u0441\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432. \u0414\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0438\u0441\u043a\u0430\u0442\u044c \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043e\u0431 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u0445 \u0432 \u0441\u043e\u0441\u0435\u0434\u043d\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 AS, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-21599 - \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Juniper Tunnel Driver (JTD) \u041e\u0421 Junos Evolved, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u043f\u043e \u0441\u0435\u0442\u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u0432\u044b\u0437\u043e\u0432\u0430 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f DoS.\n\n\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 IPv6, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043f\u0430\u043c\u044f\u0442\u044c \u044f\u0434\u0440\u0430 \u043d\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0435\u0435 \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u044e. \u041d\u0435\u043f\u0440\u0435\u0440\u044b\u0432\u043d\u043e\u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u044d\u0442\u0438\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0431\u0443\u0434\u0443\u0442 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0442\u044c \u0438\u0441\u0442\u043e\u0449\u0430\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u044c \u044f\u0434\u0440\u0430, \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u044f \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0435 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 DoS.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 OpenSSH, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 Junos OS \u0438 Junos OS Evolved, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043a\u0430\u043a CVE-2024-6387 (regreSSHion) \u0438 CVE-2024-39894.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Juniper \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0435 Junos Space 24.1R2 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u043e\u0447\u0442\u0438 60 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 Expat (libexpat), \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 XML-\u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u0430.\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u0447\u0438\u0441\u043b\u043e \u043e\u0448\u0438\u0431\u043e\u043a \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432 Junos OS \u0438 Junos OS Evolved, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u043b\u0438 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a DoS-\u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f\u043c \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u041d\u0438 \u043e\u0434\u043d\u0430 \u0438\u0437 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e-\u0432\u0438\u0434\u0438\u043c\u043e\u043c\u0443, \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445, \u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435\u0440\u0435\u0434\u043a\u043e\u00a0\u043d\u0430\u0446\u0435\u043b\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u044b \u0441 \u041e\u0421 Junos.", "creation_timestamp": "2025-01-14T13:40:05.000000Z"}]}