Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-52958 (GCVE-0-2025-52958)
Vulnerability from cvelistv5 – Published: 2025-07-11 14:43 – Updated: 2025-07-11 14:55- CWE-617 - Reachable Assertion
| URL | Tags |
|---|---|
| https://supportportal.juniper.net/JSA100066 | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Juniper Networks | Junos OS |
Affected:
0 , < 22.2R3-S6
(semver)
Affected: 22.4 , < 22.4R3-S6 (semver) Affected: 23.2 , < 23.2R2-S3 (semver) Affected: 23.4 , < 23.4R2-S4 (semver) Affected: 24.2 , < 24.2R2 (semver) |
|
| Juniper Networks | Junos OS Evolved |
Affected:
0 , < 22.2R3-S6-EVO
(semver)
Affected: 22.4 , < 22.4R3-S6-EVO (semver) Affected: 23.2 , < 23.2R2-S3-EVO (semver) Affected: 23.4 , < 23.4R2-S4-EVO (semver) Affected: 24.2 , < 24.2R2-EVO (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-52958",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-11T14:55:42.909359Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T14:55:56.096Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Junos OS",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "22.2R3-S6",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "22.4R3-S6",
"status": "affected",
"version": "22.4",
"versionType": "semver"
},
{
"lessThan": "23.2R2-S3",
"status": "affected",
"version": "23.2",
"versionType": "semver"
},
{
"lessThan": "23.4R2-S4",
"status": "affected",
"version": "23.4",
"versionType": "semver"
},
{
"lessThan": "24.2R2",
"status": "affected",
"version": "24.2",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Junos OS Evolved",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "22.2R3-S6-EVO",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "22.4R3-S6-EVO",
"status": "affected",
"version": "22.4",
"versionType": "semver"
},
{
"lessThan": "23.2R2-S3-EVO",
"status": "affected",
"version": "23.2",
"versionType": "semver"
},
{
"lessThan": "23.4R2-S4-EVO",
"status": "affected",
"version": "23.4",
"versionType": "semver"
},
{
"lessThan": "24.2R2-EVO",
"status": "affected",
"version": "24.2",
"versionType": "semver"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe following minimal configuration is required:\u003c/p\u003e \u003ctt\u003e[protocols bgp]\u003cbr\u003e\u003c/tt\u003e\u003ctt\u003e[routing-options validation]\u003c/tt\u003e"
}
],
"value": "The following minimal configuration is required:\n\n [protocols bgp]\n[routing-options validation]"
}
],
"datePublic": "2025-07-09T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\u0026nbsp;\u003c/span\u003eNetworks Junos OS and Junos OS Evolved allows an adjacent,\u0026nbsp;unauthenticated\u0026nbsp;attacker to cause a Denial of Service (DoS).\u003cp\u003eOn all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\u003c/p\u003e\u003cp\u003eContinued session establishment failures leads to a sustained DoS condition.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThis issue affects Junos OS:\u003c/p\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAll versions before 22.2R3-S6, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 22.4 before 22.4R3-S6, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 23.2 before 23.2R2-S3, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 23.4 before 23.4R2-S4, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 24.2 before 24.2R2; \u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003eJunos OS Evolved: \u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAll versions before 22.2R3-S6-EVO, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 22.4 before\u0026nbsp;22.4R3-S6-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 23.2 before\u0026nbsp;23.2R2-S3-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 23.4 before 23.4R2-S4-EVO, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003efrom 24.2 before 24.2R2-EVO.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e"
}
],
"value": "A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\u00a0Networks Junos OS and Junos OS Evolved allows an adjacent,\u00a0unauthenticated\u00a0attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\n\nContinued session establishment failures leads to a sustained DoS condition.\u00a0\n\nThis issue affects Junos OS:\n\n * All versions before 22.2R3-S6, \n * from 22.4 before 22.4R3-S6, \n * from 23.2 before 23.2R2-S3, \n * from 23.4 before 23.4R2-S4, \n * from 24.2 before 24.2R2; \n\n\n\nJunos OS Evolved: \n * All versions before 22.2R3-S6-EVO, \n * from 22.4 before\u00a022.4R3-S6-EVO,\n * from 23.2 before\u00a023.2R2-S3-EVO,\n * from 23.4 before 23.4R2-S4-EVO, \n * from 24.2 before 24.2R2-EVO."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "AUTOMATIC",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "GREEN",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/R:A/RE:M/U:Green",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-617",
"description": "CWE-617 Reachable Assertion",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T14:43:38.431Z",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://supportportal.juniper.net/JSA100066"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The following software releases have been updated to resolve this specific issue: \u003cbr\u003e\u003cbr\u003eJunos OS Evolved: 22.2R3-S6-EVO, \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e22.4R3-S6-EVO,\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e23.2R2-S3-EVO,\u0026nbsp;\u003c/span\u003e\u003c/span\u003e23.4R2-S4-EVO, 24.2R2-EVO, 24.4R1-EVO, and all subsequent releases.\u003cbr\u003e\u003cbr\u003eJunos OS: 22.2R3-S6, 22.4R3-S6, 23.2R2-S3, 23.4R2-S4, 24.2R2, 24.4R1, and all subsequent releases."
}
],
"value": "The following software releases have been updated to resolve this specific issue: \n\nJunos OS Evolved: 22.2R3-S6-EVO, 22.4R3-S6-EVO,\u00a023.2R2-S3-EVO,\u00a023.4R2-S4-EVO, 24.2R2-EVO, 24.4R1-EVO, and all subsequent releases.\n\nJunos OS: 22.2R3-S6, 22.4R3-S6, 23.2R2-S3, 23.4R2-S4, 24.2R2, 24.4R1, and all subsequent releases."
}
],
"source": {
"advisory": "JSA100066",
"defect": [
"1851205"
],
"discovery": "USER"
},
"title": "Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "There are no known workarounds for this issue."
}
],
"value": "There are no known workarounds for this issue."
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2025-52958",
"datePublished": "2025-07-11T14:43:38.431Z",
"dateReserved": "2025-06-23T13:17:37.424Z",
"dateUpdated": "2025-07-11T14:55:56.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-52958",
"date": "2026-05-21",
"epss": "0.00057",
"percentile": "0.1767"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-52958\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2025-07-11T15:15:26.627\",\"lastModified\":\"2026-01-23T19:37:09.253\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\u00a0Networks Junos OS and Junos OS Evolved allows an adjacent,\u00a0unauthenticated\u00a0attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\\n\\nContinued session establishment failures leads to a sustained DoS condition.\u00a0\\n\\nThis issue affects Junos OS:\\n\\n * All versions before 22.2R3-S6, \\n * from 22.4 before 22.4R3-S6, \\n * from 23.2 before 23.2R2-S3, \\n * from 23.4 before 23.4R2-S4, \\n * from 24.2 before 24.2R2; \\n\\n\\n\\nJunos OS Evolved: \\n * All versions before 22.2R3-S6-EVO, \\n * from 22.4 before\u00a022.4R3-S6-EVO,\\n * from 23.2 before\u00a023.2R2-S3-EVO,\\n * from 23.4 before 23.4R2-S4-EVO, \\n * from 24.2 before 24.2R2-EVO.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de aserci\u00f3n alcanzable en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). En todos los dispositivos Junos OS y Junos OS Evolved, cuando la validaci\u00f3n de ruta est\u00e1 habilitada, una condici\u00f3n poco com\u00fan durante el establecimiento de la sesi\u00f3n inicial de BGP puede provocar un bloqueo y reinicio del rpd. Esto ocurre espec\u00edficamente cuando la solicitud de conexi\u00f3n falla durante un escenario de manejo de errores. Los fallos continuos en el establecimiento de la sesi\u00f3n conducen a una condici\u00f3n de DoS sostenida. Este problema afecta a Junos OS: * Todas las versiones anteriores a 22.2R3-S6, * desde 22.4 hasta 22.4R3-S6, * desde 23.2 hasta 23.2R2-S3, * desde 23.4 hasta 23.4R2-S4, * desde 24.2 hasta 24.2R2; Junos OS Evolved: * Todas las versiones anteriores a 22.2R3-S6-EVO, * desde 22.4 hasta 22.4R3-S6-EVO, * desde 23.2 hasta 23.2R2-S3-EVO, * desde 23.4 hasta 23.4R2-S4-EVO, * desde 24.2 hasta 24.2R2-EVO.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:M/U:Green\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"LOW\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"AUTOMATIC\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"GREEN\"}}],\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-617\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.2\",\"matchCriteriaId\":\"92CA998E-CCA2-4629-ABAC-20F9C5E209CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"06156CD6-09D3-4A05-9C5E-BC64A70640F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E949B21B-AD62-4022-9088-06313277479E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D862E6F-0D01-4B25-8340-888C30F75A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F28F73E-8563-41B9-A313-BBAAD5B57A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37D4694-C80B-475E-AB5B-BB431F59C5E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC0D2D2-4922-4675-8A2C-57A08D7BE334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"591AA3E6-62A2-4A1A-A04C-E808F71D8B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"786F993E-32CB-492A-A7CC-A7E4F48EA8B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC449CC7-B2D6-41CB-8D6C-81DE89E79520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E47861-3311-45E2-A722-8CD7FFDC2DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"748EAB0A-6B22-4098-8735-CC76BEAA9BB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1379EF30-AF04-4F98-8328-52A631F24737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E42A41-7965-456B-B0AF-9D3229CE4D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1A77D6-D3AD-481B-979C-8F778530B175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A064B6B-A99B-4D8D-A62D-B00C7870BC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"40813417-A938-4F74-A419-8C5188A35486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC1BA1A-DF0E-4B15-86BA-24C60E546732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB967BF-3495-476D-839A-9DBFCBE69F91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E5688D6-DCA4-4550-9CD1-A3D792252129\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8494546C-00EA-49B6-B6FA-FDE42CA5B1FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB98579-FA33-4E41-A162-A46E9709FBD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E2562F-FB18-4347-8497-7D61B8157EBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"494D1D96-1DA2-4B0A-9536-1B5A4FDFCA09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A1E37B-1990-44D9-87FE-300678243BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A78CC80-E8B1-4CDA-BB35-A61833657FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3B2FE1-C228-46BE-AC76-70C2687050AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B16FF0-900F-4AEE-B670-A537139F6909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B227E831-30FF-4BE1-B8B2-31829A5610A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADA814B-EF98-45B1-AF7A-0C89688F7CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6FB32DF-D062-4FB9-8777-452978BEC7B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B6C811-5C10-4486-849D-5559B592350A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"78481ABC-3620-410D-BC78-334657E0BB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8A5BA3-87BD-473A-B229-2AAB2C797005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B74AC3E-8FC9-400A-A176-4F7F21F10756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB2D1FCE-8019-4CE1-BA45-D62F91AF7B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"175CCB13-76C0-44A4-A71D-41E22B92EB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"166BFDB3-1945-4949-BC2B-E18442FF2E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5923610F-878C-48CA-8B5D-9C609E4DD4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C207E3-0252-4192-8E8C-E2ED2831B4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"89524D6D-0B22-4952-AD8E-8072C5A05D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD69A194-1B03-44EA-8092-79BD10C6F729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8463ADB4-B8A7-4D63-97A9-232ED713A21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE68337F-106E-4317-A5B6-292B0159F577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.2\",\"matchCriteriaId\":\"D30A46A8-A9FE-48FF-BC88-841493254FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CA3365-F9AF-40DF-8700-30AD4BC58E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77A072D-350A-42F2-8324-7D3AC1711BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83AE395C-A651-4568-88E3-3600544BF799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7FEFD0A-A969-4F53-8668-1231FD675D6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"81CC3480-4B65-4588-8D46-FA80A8F6D143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63DBEE5-B0C2-498F-A672-B6596C89B0A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9370C46D-3AA1-4562-B67F-DF6EA10F209B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB9F20B-7683-4B0D-8D2B-5569414EBC29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0A8640-4448-41AB-84D1-431C56397223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"871432BA-CA86-4EAE-A602-F02AF008B682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A33C425-921F-4795-B834-608C8F1597E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93887799-F62C-4A4A-BCF5-004D0B4D4154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C473D2-2612-4480-82D8-8A24D0687BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FB4C5CA-A709-4B13-A9E0-372098A72AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"04CE952D-E3C1-4B34-9E65-EC52BFE887AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AE9D1A7-4721-4E1D-B965-FDC38126B1DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8643AA3-29EF-48A7-B033-CB60988E214B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9800BA03-E6BF-4212-B2E7-69C0FD27D294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACCA655D-C542-44F1-B183-4C864CFF2D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D499B19-A91A-4B76-B1CB-6A07A4CB212B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B2830C-26EE-446E-B0C3-B5E43AD897B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C7367E6-B491-4A1F-B9D7-BC86A15A0773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A89D1E-9EA4-4959-9F54-84F1F99A4ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DEAA7FD-385F-4221-907E-65ABC16BE4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDEC008A-3137-48D1-8ABC-6DB0EFC40E50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"558D234D-BC50-415F-86D6-8E19D6C3ACE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F4EEEE-77E9-4973-A770-99E7BA2F05F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4BB6910-B994-45FD-8153-5EC00EE842E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D657944B-2066-4F2C-BC92-EDF4DE1C165C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"75A58924-6348-44CF-AB39-1FCE17FE81AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7F0D73-85EE-4A07-B51B-6BF52ECBA75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE777A1F-9CD9-426E-AF1C-FBE01EB9A4A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7147BA60-30A5-4CED-9AAF-F6BEA0528B89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5CE59B-14B2-4F4C-81B5-0430EC954956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB82B22F-9005-4EF0-A1E3-4261757783D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0224D3F1-8B86-432C-8F5B-B4B7B69ADF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB2FE5FE-0ADE-406E-A23D-FDCC104B2496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E58987A-D7B7-4FFF-9969-E8FD76AE2BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD89AAD-C615-42AF-B8AF-E6067862F0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"28AFF11D-E418-4A76-B557-F60622602537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A86A69D-2B90-4B3B-A6EC-88358284787D\"}]}]}],\"references\":[{\"url\":\"https://supportportal.juniper.net/JSA100066\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52958\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-11T14:55:42.909359Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-11T14:55:47.158Z\"}}], \"cna\": {\"title\": \"Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash\", \"source\": {\"defect\": [\"1851205\"], \"advisory\": \"JSA100066\", \"discovery\": \"USER\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"AUTOMATIC\", \"baseScore\": 6, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/R:A/RE:M/U:Green\", \"providerUrgency\": \"GREEN\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"LOW\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"22.2R3-S6\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4R3-S6\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2\", \"lessThan\": \"23.2R2-S3\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.4\", \"lessThan\": \"23.4R2-S4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.2\", \"lessThan\": \"24.2R2\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS Evolved\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"22.2R3-S6-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4R3-S6-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2\", \"lessThan\": \"23.2R2-S3-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.4\", \"lessThan\": \"23.4R2-S4-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.2\", \"lessThan\": \"24.2R2-EVO\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"base64\": false}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The following software releases have been updated to resolve this specific issue: \\n\\nJunos OS Evolved: 22.2R3-S6-EVO, 22.4R3-S6-EVO,\\u00a023.2R2-S3-EVO,\\u00a023.4R2-S4-EVO, 24.2R2-EVO, 24.4R1-EVO, and all subsequent releases.\\n\\nJunos OS: 22.2R3-S6, 22.4R3-S6, 23.2R2-S3, 23.4R2-S4, 24.2R2, 24.4R1, and all subsequent releases.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The following software releases have been updated to resolve this specific issue: \u003cbr\u003e\u003cbr\u003eJunos OS Evolved: 22.2R3-S6-EVO, \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e22.4R3-S6-EVO,\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e23.2R2-S3-EVO,\u0026nbsp;\u003c/span\u003e\u003c/span\u003e23.4R2-S4-EVO, 24.2R2-EVO, 24.4R1-EVO, and all subsequent releases.\u003cbr\u003e\u003cbr\u003eJunos OS: 22.2R3-S6, 22.4R3-S6, 23.2R2-S3, 23.4R2-S4, 24.2R2, 24.4R1, and all subsequent releases.\", \"base64\": false}]}], \"datePublic\": \"2025-07-09T16:00:00.000Z\", \"references\": [{\"url\": \"https://supportportal.juniper.net/JSA100066\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"There are no known workarounds for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"There are no known workarounds for this issue.\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\\u00a0Networks Junos OS and Junos OS Evolved allows an adjacent,\\u00a0unauthenticated\\u00a0attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\\n\\nContinued session establishment failures leads to a sustained DoS condition.\\u00a0\\n\\nThis issue affects Junos OS:\\n\\n * All versions before 22.2R3-S6, \\n * from 22.4 before 22.4R3-S6, \\n * from 23.2 before 23.2R2-S3, \\n * from 23.4 before 23.4R2-S4, \\n * from 24.2 before 24.2R2; \\n\\n\\n\\nJunos OS Evolved: \\n * All versions before 22.2R3-S6-EVO, \\n * from 22.4 before\\u00a022.4R3-S6-EVO,\\n * from 23.2 before\\u00a023.2R2-S3-EVO,\\n * from 23.4 before 23.4R2-S4-EVO, \\n * from 24.2 before 24.2R2-EVO.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eA Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\u0026nbsp;\u003c/span\u003eNetworks Junos OS and Junos OS Evolved allows an adjacent,\u0026nbsp;unauthenticated\u0026nbsp;attacker to cause a Denial of Service (DoS).\u003cp\u003eOn all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\u003c/p\u003e\u003cp\u003eContinued session establishment failures leads to a sustained DoS condition.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThis issue affects Junos OS:\u003c/p\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAll versions before 22.2R3-S6, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 22.4 before 22.4R3-S6, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 23.2 before 23.2R2-S3, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 23.4 before 23.4R2-S4, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 24.2 before 24.2R2; \u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003eJunos OS Evolved: \u003cbr\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAll versions before 22.2R3-S6-EVO, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 22.4 before\u0026nbsp;22.4R3-S6-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 23.2 before\u0026nbsp;23.2R2-S3-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 23.4 before 23.4R2-S4-EVO, \u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003efrom 24.2 before 24.2R2-EVO.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-617\", \"description\": \"CWE-617 Reachable Assertion\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"The following minimal configuration is required:\\n\\n [protocols bgp]\\n[routing-options validation]\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe following minimal configuration is required:\u003c/p\u003e \u003ctt\u003e[protocols bgp]\u003cbr\u003e\u003c/tt\u003e\u003ctt\u003e[routing-options validation]\u003c/tt\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2025-07-11T14:43:38.431Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-52958\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-11T14:55:56.096Z\", \"dateReserved\": \"2025-06-23T13:17:37.424Z\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"datePublished\": \"2025-07-11T14:43:38.431Z\", \"assignerShortName\": \"juniper\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0583
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Apstra | Apstra versions antérieures à 6.0.0 | ||
| Juniper Networks | Security Director | Security Director versions antérieures à 24.4.1-1703 | ||
| Juniper Networks | CTPView | CTPview versions antérieures à 9.3R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apstra versions ant\u00e9rieures \u00e0 6.0.0",
"product": {
"name": "Apstra",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director versions ant\u00e9rieures \u00e0 24.4.1-1703",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPview versions ant\u00e9rieures \u00e0 9.3R2",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52984"
},
{
"name": "CVE-2020-10136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10136"
},
{
"name": "CVE-2024-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
},
{
"name": "CVE-2024-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
},
{
"name": "CVE-2025-52950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52950"
},
{
"name": "CVE-2025-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52983"
},
{
"name": "CVE-2025-52952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52952"
},
{
"name": "CVE-2025-52963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52963"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-26466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
},
{
"name": "CVE-2024-23984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
},
{
"name": "CVE-2025-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52986"
},
{
"name": "CVE-2025-52988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52988"
},
{
"name": "CVE-2025-52949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52949"
},
{
"name": "CVE-2025-6549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6549"
},
{
"name": "CVE-2025-52954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52954"
},
{
"name": "CVE-2024-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7595"
},
{
"name": "CVE-2025-52947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52947"
},
{
"name": "CVE-2025-52958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52958"
},
{
"name": "CVE-2025-52964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52964"
},
{
"name": "CVE-2025-52946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52946"
},
{
"name": "CVE-2024-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
},
{
"name": "CVE-2025-52951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52951"
},
{
"name": "CVE-2025-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23019"
},
{
"name": "CVE-2025-52955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52955"
},
{
"name": "CVE-2025-23018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23018"
},
{
"name": "CVE-2025-52948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52948"
},
{
"name": "CVE-2025-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52981"
},
{
"name": "CVE-2024-24968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
},
{
"name": "CVE-2025-52953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52953"
},
{
"name": "CVE-2025-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52985"
},
{
"name": "CVE-2025-52989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52989"
},
{
"name": "CVE-2025-52980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52980"
},
{
"name": "CVE-2025-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52982"
},
{
"name": "CVE-2025-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30661"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0583",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52988",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52963",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52958",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52985",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52986",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2024-3596",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52989",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52981",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52983",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52946",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52954",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52953",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52947",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52949",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-26466",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52955",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52952",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-30661",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52951",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52984",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52948",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52964",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52982",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52950",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52980",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-6549",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
}
]
}
CERTFR-2025-AVI-0583
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Apstra | Apstra versions antérieures à 6.0.0 | ||
| Juniper Networks | Security Director | Security Director versions antérieures à 24.4.1-1703 | ||
| Juniper Networks | CTPView | CTPview versions antérieures à 9.3R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apstra versions ant\u00e9rieures \u00e0 6.0.0",
"product": {
"name": "Apstra",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director versions ant\u00e9rieures \u00e0 24.4.1-1703",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPview versions ant\u00e9rieures \u00e0 9.3R2",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52984"
},
{
"name": "CVE-2020-10136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10136"
},
{
"name": "CVE-2024-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
},
{
"name": "CVE-2024-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
},
{
"name": "CVE-2025-52950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52950"
},
{
"name": "CVE-2025-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52983"
},
{
"name": "CVE-2025-52952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52952"
},
{
"name": "CVE-2025-52963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52963"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-26466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
},
{
"name": "CVE-2024-23984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
},
{
"name": "CVE-2025-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52986"
},
{
"name": "CVE-2025-52988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52988"
},
{
"name": "CVE-2025-52949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52949"
},
{
"name": "CVE-2025-6549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6549"
},
{
"name": "CVE-2025-52954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52954"
},
{
"name": "CVE-2024-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7595"
},
{
"name": "CVE-2025-52947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52947"
},
{
"name": "CVE-2025-52958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52958"
},
{
"name": "CVE-2025-52964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52964"
},
{
"name": "CVE-2025-52946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52946"
},
{
"name": "CVE-2024-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
},
{
"name": "CVE-2025-52951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52951"
},
{
"name": "CVE-2025-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23019"
},
{
"name": "CVE-2025-52955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52955"
},
{
"name": "CVE-2025-23018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23018"
},
{
"name": "CVE-2025-52948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52948"
},
{
"name": "CVE-2025-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52981"
},
{
"name": "CVE-2024-24968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
},
{
"name": "CVE-2025-52953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52953"
},
{
"name": "CVE-2025-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52985"
},
{
"name": "CVE-2025-52989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52989"
},
{
"name": "CVE-2025-52980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52980"
},
{
"name": "CVE-2025-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52982"
},
{
"name": "CVE-2025-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30661"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0583",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52988",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52963",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52958",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52985",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52986",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2024-3596",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52989",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52981",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52983",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52946",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52954",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52953",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52947",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52949",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-26466",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52955",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52952",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-30661",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52951",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52984",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52948",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52964",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52982",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52950",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52980",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-6549",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
}
]
}
FKIE_CVE-2025-52958
Vulnerability from fkie_nvd - Published: 2025-07-11 15:15 - Updated: 2026-01-23 19:37| URL | Tags | ||
|---|---|---|---|
| sirt@juniper.net | https://supportportal.juniper.net/JSA100066 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | junos | * | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.2 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 22.4 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.2 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 23.4 | |
| juniper | junos | 24.2 | |
| juniper | junos | 24.2 | |
| juniper | junos | 24.2 | |
| juniper | junos | 24.2 | |
| juniper | junos_os_evolved | * | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.2 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 22.4 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 24.2 | |
| juniper | junos_os_evolved | 24.2 | |
| juniper | junos_os_evolved | 24.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92CA998E-CCA2-4629-ABAC-20F9C5E209CB",
"versionEndExcluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
"matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "BC449CC7-B2D6-41CB-8D6C-81DE89E79520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "05E47861-3311-45E2-A722-8CD7FFDC2DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "748EAB0A-6B22-4098-8735-CC76BEAA9BB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
"matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "7E5688D6-DCA4-4550-9CD1-A3D792252129",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "8494546C-00EA-49B6-B6FA-FDE42CA5B1FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "8BB98579-FA33-4E41-A162-A46E9709FBD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "08E2562F-FB18-4347-8497-7D61B8157EBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "494D1D96-1DA2-4B0A-9536-1B5A4FDFCA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "60A1E37B-1990-44D9-87FE-300678243BE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*",
"matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "1ADA814B-EF98-45B1-AF7A-0C89688F7CA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "A6FB32DF-D062-4FB9-8777-452978BEC7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "B3B6C811-5C10-4486-849D-5559B592350A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*",
"matchCriteriaId": "78481ABC-3620-410D-BC78-334657E0BB75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "BE8A5BA3-87BD-473A-B229-2AAB2C797005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "8B74AC3E-8FC9-400A-A176-4F7F21F10756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "CB2D1FCE-8019-4CE1-BA45-D62F91AF7B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "175CCB13-76C0-44A4-A71D-41E22B92EB23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "166BFDB3-1945-4949-BC2B-E18442FF2E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "5923610F-878C-48CA-8B5D-9C609E4DD4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "A7C207E3-0252-4192-8E8C-E2ED2831B4F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*",
"matchCriteriaId": "89524D6D-0B22-4952-AD8E-8072C5A05D5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "AD69A194-1B03-44EA-8092-79BD10C6F729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "8463ADB4-B8A7-4D63-97A9-232ED713A21C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "FE68337F-106E-4317-A5B6-292B0159F577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D30A46A8-A9FE-48FF-BC88-841493254FBB",
"versionEndExcluding": "22.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "2FB9F20B-7683-4B0D-8D2B-5569414EBC29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "AD0A8640-4448-41AB-84D1-431C56397223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "871432BA-CA86-4EAE-A602-F02AF008B682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*",
"matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "9800BA03-E6BF-4212-B2E7-69C0FD27D294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "ACCA655D-C542-44F1-B183-4C864CFF2D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "6D499B19-A91A-4B76-B1CB-6A07A4CB212B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "B6B2830C-26EE-446E-B0C3-B5E43AD897B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "1C7367E6-B491-4A1F-B9D7-BC86A15A0773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "72A89D1E-9EA4-4959-9F54-84F1F99A4ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*",
"matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "A4BB6910-B994-45FD-8153-5EC00EE842E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "D657944B-2066-4F2C-BC92-EDF4DE1C165C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "75A58924-6348-44CF-AB39-1FCE17FE81AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9D7F0D73-85EE-4A07-B51B-6BF52ECBA75E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "FE777A1F-9CD9-426E-AF1C-FBE01EB9A4A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "7147BA60-30A5-4CED-9AAF-F6BEA0528B89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "6E5CE59B-14B2-4F4C-81B5-0430EC954956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "FB82B22F-9005-4EF0-A1E3-4261757783D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "0224D3F1-8B86-432C-8F5B-B4B7B69ADF31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "EB2FE5FE-0ADE-406E-A23D-FDCC104B2496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "2E58987A-D7B7-4FFF-9969-E8FD76AE2BE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*",
"matchCriteriaId": "0DD89AAD-C615-42AF-B8AF-E6067862F0F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "28AFF11D-E418-4A76-B557-F60622602537",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "0A86A69D-2B90-4B3B-A6EC-88358284787D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\u00a0Networks Junos OS and Junos OS Evolved allows an adjacent,\u00a0unauthenticated\u00a0attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\n\nContinued session establishment failures leads to a sustained DoS condition.\u00a0\n\nThis issue affects Junos OS:\n\n * All versions before 22.2R3-S6, \n * from 22.4 before 22.4R3-S6, \n * from 23.2 before 23.2R2-S3, \n * from 23.4 before 23.4R2-S4, \n * from 24.2 before 24.2R2; \n\n\n\nJunos OS Evolved: \n * All versions before 22.2R3-S6-EVO, \n * from 22.4 before\u00a022.4R3-S6-EVO,\n * from 23.2 before\u00a023.2R2-S3-EVO,\n * from 23.4 before 23.4R2-S4-EVO, \n * from 24.2 before 24.2R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de aserci\u00f3n alcanzable en el daemon de protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). En todos los dispositivos Junos OS y Junos OS Evolved, cuando la validaci\u00f3n de ruta est\u00e1 habilitada, una condici\u00f3n poco com\u00fan durante el establecimiento de la sesi\u00f3n inicial de BGP puede provocar un bloqueo y reinicio del rpd. Esto ocurre espec\u00edficamente cuando la solicitud de conexi\u00f3n falla durante un escenario de manejo de errores. Los fallos continuos en el establecimiento de la sesi\u00f3n conducen a una condici\u00f3n de DoS sostenida. Este problema afecta a Junos OS: * Todas las versiones anteriores a 22.2R3-S6, * desde 22.4 hasta 22.4R3-S6, * desde 23.2 hasta 23.2R2-S3, * desde 23.4 hasta 23.4R2-S4, * desde 24.2 hasta 24.2R2; Junos OS Evolved: * Todas las versiones anteriores a 22.2R3-S6-EVO, * desde 22.4 hasta 22.4R3-S6-EVO, * desde 23.2 hasta 23.2R2-S3-EVO, * desde 23.4 hasta 23.4R2-S4-EVO, * desde 24.2 hasta 24.2R2-EVO."
}
],
"id": "CVE-2025-52958",
"lastModified": "2026-01-23T19:37:09.253",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "sirt@juniper.net",
"type": "Secondary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "AUTOMATIC",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "GREEN",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:M/U:Green",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "MODERATE"
},
"source": "sirt@juniper.net",
"type": "Secondary"
}
]
},
"published": "2025-07-11T15:15:26.627",
"references": [
{
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
],
"url": "https://supportportal.juniper.net/JSA100066"
}
],
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-617"
}
],
"source": "sirt@juniper.net",
"type": "Secondary"
}
]
}
GHSA-5694-Q557-W4RG
Vulnerability from github – Published: 2025-07-11 15:31 – Updated: 2025-07-11 15:31A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.
Continued session establishment failures leads to a sustained DoS condition.
This issue affects Junos OS:
- All versions before 22.2R3-S6,
- from 22.4 before 22.4R3-S6,
- from 23.2 before 23.2R2-S3,
- from 23.4 before 23.4R2-S4,
- from 24.2 before 24.2R2;
Junos OS Evolved: * All versions before 22.2R3-S6-EVO, * from 22.4 before 22.4R3-S6-EVO, * from 23.2 before 23.2R2-S3-EVO, * from 23.4 before 23.4R2-S4-EVO, * from 24.2 before 24.2R2-EVO.
{
"affected": [],
"aliases": [
"CVE-2025-52958"
],
"database_specific": {
"cwe_ids": [
"CWE-617"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-11T15:15:26Z",
"severity": "MODERATE"
},
"details": "A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper\u00a0Networks Junos OS and Junos OS Evolved allows an adjacent,\u00a0unauthenticated\u00a0attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.\n\nContinued session establishment failures leads to a sustained DoS condition.\u00a0\n\nThis issue affects Junos OS:\n\n * All versions before 22.2R3-S6, \n * from 22.4 before 22.4R3-S6, \n * from 23.2 before 23.2R2-S3, \n * from 23.4 before 23.4R2-S4, \n * from 24.2 before 24.2R2; \n\n\n\nJunos OS Evolved: \n * All versions before 22.2R3-S6-EVO, \n * from 22.4 before\u00a022.4R3-S6-EVO,\n * from 23.2 before\u00a023.2R2-S3-EVO,\n * from 23.4 before 23.4R2-S4-EVO, \n * from 24.2 before 24.2R2-EVO.",
"id": "GHSA-5694-q557-w4rg",
"modified": "2025-07-11T15:31:39Z",
"published": "2025-07-11T15:31:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52958"
},
{
"type": "WEB",
"url": "https://supportportal.juniper.net/JSA100066"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:M/U:Green",
"type": "CVSS_V4"
}
]
}
WID-SEC-W-2025-1519
Vulnerability from csaf_certbund - Published: 2025-07-09 22:00 - Updated: 2025-10-08 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://supportportal.juniper.net/s/global-search… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nJuniper Security Director erm\u00f6glicht die Verwaltung und Kontrolle von Sicherheitsrichtlinien f\u00fcr lokale Infrastrukturen \u00fcber eine zentrale, webbasierte Benutzeroberfl\u00e4che.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper MX Series, Juniper SRX Series und Juniper Security Director ausnutzen, um Daten zu manipulieren oder offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, Code auszuf\u00fchren, einen Denial of Service zu verursachen oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1519 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1519.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1519 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1519"
},
{
"category": "external",
"summary": "Juniper Security Advisories vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sortCriteria=date%20descending\u0026f-sf_primarysourcename=Knowledge\u0026f-sf_articletype=Security%20Advisories\u0026numberOfResults=30"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2024-3596 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-26466-resolved-in-9-3R2-release vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-30661 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52946 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52947 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52948 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52949 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52950 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52951 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52952 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52953 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52954 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52955 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52958 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52963 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52964 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52980 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52981 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52982 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52983 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52984 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52985 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52986 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52988 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52989 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-6549 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"category": "external",
"summary": "Juniper Security Bulletin VU#199397 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103141 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103139 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103138 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103140 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-10-08T22:00:00.000+00:00",
"generator": {
"date": "2025-10-09T07:29:59.775+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1519",
"initial_release_date": "2025-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-21162, EUVD-2025-21161, EUVD-2025-21160, EUVD-2025-21158, EUVD-2025-21157, EUVD-2025-21165, EUVD-2025-21167, EUVD-2025-21156, EUVD-2025-21155, EUVD-2025-21166, EUVD-2025-21163"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T032362",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
},
{
"category": "product_version",
"name": "Evolved",
"product": {
"name": "Juniper JUNOS Evolved",
"product_id": "T042696",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:evolved"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Security Director \u003c24.1R4",
"product": {
"name": "Juniper Junos Space Security Director \u003c24.1R4",
"product_id": "T047484"
}
},
{
"category": "product_version",
"name": "Security Director 24.1R4",
"product": {
"name": "Juniper Junos Space Security Director 24.1R4",
"product_id": "T047484-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r4::security_director"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.1R4",
"product": {
"name": "Juniper Junos Space \u003c24.1R4",
"product_id": "T047485"
}
},
{
"category": "product_version",
"name": "24.1R4",
"product": {
"name": "Juniper Junos Space 24.1R4",
"product_id": "T047485-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r4"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
},
{
"category": "product_name",
"name": "Juniper MX Series",
"product": {
"name": "Juniper MX Series",
"product_id": "918766",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:mx:-"
}
}
},
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T045305",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Security Director",
"product": {
"name": "Juniper Security Director",
"product_id": "T045307",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:security_director:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2025-26466",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-26466"
},
{
"cve": "CVE-2025-30661",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-30661"
},
{
"cve": "CVE-2025-52946",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52946"
},
{
"cve": "CVE-2025-52947",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52947"
},
{
"cve": "CVE-2025-52948",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52948"
},
{
"cve": "CVE-2025-52949",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52949"
},
{
"cve": "CVE-2025-52950",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52950"
},
{
"cve": "CVE-2025-52951",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52951"
},
{
"cve": "CVE-2025-52952",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52952"
},
{
"cve": "CVE-2025-52953",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52953"
},
{
"cve": "CVE-2025-52954",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52954"
},
{
"cve": "CVE-2025-52955",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52955"
},
{
"cve": "CVE-2025-52958",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52958"
},
{
"cve": "CVE-2025-52963",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52963"
},
{
"cve": "CVE-2025-52964",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52964"
},
{
"cve": "CVE-2025-52980",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52980"
},
{
"cve": "CVE-2025-52981",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52981"
},
{
"cve": "CVE-2025-52982",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52982"
},
{
"cve": "CVE-2025-52983",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52983"
},
{
"cve": "CVE-2025-52984",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52984"
},
{
"cve": "CVE-2025-52985",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52985"
},
{
"cve": "CVE-2025-52986",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52986"
},
{
"cve": "CVE-2025-52988",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52988"
},
{
"cve": "CVE-2025-52989",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52989"
},
{
"cve": "CVE-2025-6549",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-6549"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.