Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-52985 (GCVE-0-2025-52985)
Vulnerability from cvelistv5 – Published: 2025-07-11 15:09 – Updated: 2025-07-18 07:16- CWE-480 - Use of Incorrect Operator
| URL | Tags |
|---|---|
| https://supportportal.juniper.net/JSA100091 | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Juniper Networks | Junos OS Evolved |
Affected:
23.2R2-S3-EVO , < 23.2R2-S4-EVO
(semver)
Affected: 23.4R2-S3-EVO , < 23.4R2-S5-EVO (semver) Affected: 24.2R2-EVO , < 24.2R2-S1-EVO (semver) Affected: 24.4-EVO , < 24.4R1-S3-EVO, 24.4R2-EVO (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-52985",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-11T16:04:44.130312Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T19:55:16.560Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Junos OS Evolved",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "23.2R2-S4-EVO",
"status": "affected",
"version": "23.2R2-S3-EVO",
"versionType": "semver"
},
{
"lessThan": "23.4R2-S5-EVO",
"status": "affected",
"version": "23.4R2-S3-EVO",
"versionType": "semver"
},
{
"lessThan": "24.2R2-S1-EVO",
"status": "affected",
"version": "24.2R2-EVO",
"versionType": "semver"
},
{
"lessThan": "24.4R1-S3-EVO, 24.4R2-EVO",
"status": "affected",
"version": "24.4-EVO",
"versionType": "semver"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A system will only be affected by this vulnerability if like in the following example a\n\nfirewall filter applied to the lo0 or re:mgmt interface references a prefix list with the \u0027from prefix-list\u0027 clause, and that prefix list contains more than 10 entries:\u003cbr\u003e\u003cbr\u003e\u003ctt\u003e[ policy-options prefix-list \u0026lt;prefix-list name\u0026gt; \u0026lt;prefix1\u0026gt; ]\u003cbr\u003e...\u003cbr\u003e\n\n[ policy-options prefix-list \u0026lt;prefix-list name\u0026gt;\n\n\u0026lt;prefix11\u0026gt; ]\u003cbr\u003e...\u003cbr\u003e[ firewall family \u0026lt;inet/inet6\u0026gt; filter \u0026lt;filter name\u0026gt; term \u0026lt;term name\u0026gt; from prefix-list \n\n\u0026lt;prefix-list name\u0026gt;\n\n ]\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e[ interfaces \u0026lt;lo0 unit \u0026lt;unit\u0026gt; / re:mgmt\u0026lt;0/1\u0026gt; unit \n\n\u0026lt;unit\u0026gt;\u0026gt; family \u0026lt;inet/inet6\u0026gt; filter \u0026lt;input/output\u0026gt; \n\n\u0026lt;filter name\u0026gt;\n\n ]\u003c/span\u003e\u003c/tt\u003e"
}
],
"value": "A system will only be affected by this vulnerability if like in the following example a\n\nfirewall filter applied to the lo0 or re:mgmt interface references a prefix list with the \u0027from prefix-list\u0027 clause, and that prefix list contains more than 10 entries:\n\n[ policy-options prefix-list \u003cprefix-list name\u003e \u003cprefix1\u003e ]\n...\n\n\n[ policy-options prefix-list \u003cprefix-list name\u003e\n\n\u003cprefix11\u003e ]\n...\n[ firewall family \u003cinet/inet6\u003e filter \u003cfilter name\u003e term \u003cterm name\u003e from prefix-list \n\n\u003cprefix-list name\u003e\n\n ]\n[ interfaces \u003clo0 unit \u003cunit\u003e / re:mgmt\u003c0/1\u003e unit \n\n\u003cunit\u003e\u003e family \u003cinet/inet6\u003e filter \u003cinput/output\u003e \n\n\u003cfilter name\u003e\n\n ]"
}
],
"datePublic": "2025-07-09T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A Use of Incorrect Operator\n\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\u003cbr\u003e\u003cbr\u003eWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\u003cbr\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\u003c/span\u003e\u003cbr\u003eThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\u003cbr\u003e\u003cp\u003eThis issue affects Junos OS Evolved:\u003c/p\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e24.2R2-EVO versions before 24.2R2-S1-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003eThis issue doesn\u0027t affect Junos OS Evolved versions before 23.2R1-EVO."
}
],
"value": "A Use of Incorrect Operator\n\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\n\nWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\n\n\nThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\nThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\nThis issue affects Junos OS Evolved:\n\n * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\n * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\n * 24.2R2-EVO versions before 24.2R2-S1-EVO,\n * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\n\n\nThis issue doesn\u0027t affect Junos OS Evolved versions before 23.2R1-EVO."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-480",
"description": "CWE-480 Use of Incorrect Operator",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T07:16:09.464Z",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://supportportal.juniper.net/JSA100091"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The following software releases have been updated to resolve this specific issue: 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases."
}
],
"value": "The following software releases have been updated to resolve this specific issue: 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases."
}
],
"source": {
"advisory": "JSA100091",
"defect": [
"1866334"
],
"discovery": "INTERNAL"
},
"title": "Junos OS Evolved: When a control-plane firewall filter refers to a prefix-list with more than 10 entries it\u0027s not matching",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A workaround for this issue is to refer to the prefix list either with\u0026nbsp;the \u0027source-prefix-list\u0027 or the \u0027destination-prefix-list\u0027 match condition (\u0027from\u0027)."
}
],
"value": "A workaround for this issue is to refer to the prefix list either with\u00a0the \u0027source-prefix-list\u0027 or the \u0027destination-prefix-list\u0027 match condition (\u0027from\u0027)."
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2025-52985",
"datePublished": "2025-07-11T15:09:58.361Z",
"dateReserved": "2025-06-23T18:23:44.546Z",
"dateUpdated": "2025-07-18T07:16:09.464Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-52985",
"date": "2026-05-20",
"epss": "0.00117",
"percentile": "0.29937"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-52985\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2025-07-11T16:15:25.860\",\"lastModified\":\"2026-01-23T17:06:03.340\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Use of Incorrect Operator\\n\\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\\n\\nWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\\n\\n\\nThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\\nThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\\nThis issue affects Junos OS Evolved:\\n\\n * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\\n * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\\n * 24.2R2-EVO versions before 24.2R2-S1-EVO,\\n * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\\n\\n\\nThis issue doesn\u0027t affect Junos OS Evolved versions before 23.2R1-EVO.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de uso de operador incorrecto en el firewall del motor de enrutamiento de Juniper Networks Junos OS Evolved permite a un atacante no autenticado basado en la red eludir las restricciones de seguridad. Cuando un filtro de firewall aplicado a la interfaz lo0 o re:mgmt hace referencia a una lista de prefijos con \\\"from prefix-list\\\", y dicha lista contiene m\u00e1s de 10 entradas, la lista de prefijos no coincide y los paquetes con destino o origen en el dispositivo local no se filtran. Este problema afecta a los filtros de firewall aplicados a las interfaces re:mgmt como entrada y salida, pero solo a los filtros de firewall aplicados a la interfaz lo0 como salida. Este problema es aplicable a IPv4 e IPv6, ya que una lista de prefijos puede contener prefijos de IPv4 e IPv6. Este problema afecta a Junos OS Evolved: * versiones 23.2R2-S3-EVO anteriores a 23.2R2-S4-EVO, * versiones 23.4R2-S3-EVO anteriores a 23.4R2-S5-EVO, * versiones 24.2R2-EVO anteriores a 24.2R2-S1-EVO, * versiones 24.4-EVO anteriores a 24.4R1-S3-EVO y 24.4R2-EVO. Este problema no afecta a las versiones de Junos OS Evolved anteriores a 23.2R1-EVO.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-480\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A903B31-D9E5-43FA-B09F-7E7769803720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E58987A-D7B7-4FFF-9969-E8FD76AE2BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E779C0D4-A8F7-4976-B3C8-B9802B96E715\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"080BEA58-9667-4C2C-810D-DC1187DB67DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32ADA05-5F5D-45B6-BB7B-3FA6A6F229F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6526E82-A6A6-4A65-9B01-B3FCB947F44E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF3B74FA-DF84-4E3E-BCF9-44EEF9E45910\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DA0DD2-E974-448C-BD05-ED6FCA4725FB\"}]}]}],\"references\":[{\"url\":\"https://supportportal.juniper.net/JSA100091\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52985\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-11T16:04:44.130312Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-11T16:04:45.469Z\"}}], \"cna\": {\"title\": \"Junos OS Evolved: When a control-plane firewall filter refers to a prefix-list with more than 10 entries it\u0027s not matching\", \"source\": {\"defect\": [\"1866334\"], \"advisory\": \"JSA100091\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6.9, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS Evolved\", \"versions\": [{\"status\": \"affected\", \"version\": \"23.2R2-S3-EVO\", \"lessThan\": \"23.2R2-S4-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.4R2-S3-EVO\", \"lessThan\": \"23.4R2-S5-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.2R2-EVO\", \"lessThan\": \"24.2R2-S1-EVO\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.4-EVO\", \"lessThan\": \"24.4R1-S3-EVO, 24.4R2-EVO\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"base64\": false}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The following software releases have been updated to resolve this specific issue: 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The following software releases have been updated to resolve this specific issue: 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases.\", \"base64\": false}]}], \"datePublic\": \"2025-07-09T16:00:00.000Z\", \"references\": [{\"url\": \"https://supportportal.juniper.net/JSA100091\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"A workaround for this issue is to refer to the prefix list either with\\u00a0the \u0027source-prefix-list\u0027 or the \u0027destination-prefix-list\u0027 match condition (\u0027from\u0027).\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A workaround for this issue is to refer to the prefix list either with\u0026nbsp;the \u0027source-prefix-list\u0027 or the \u0027destination-prefix-list\u0027 match condition (\u0027from\u0027).\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Use of Incorrect Operator\\n\\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\\n\\nWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\\n\\n\\nThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\\nThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\\nThis issue affects Junos OS Evolved:\\n\\n * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\\n * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\\n * 24.2R2-EVO versions before 24.2R2-S1-EVO,\\n * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\\n\\n\\nThis issue doesn\u0027t affect Junos OS Evolved versions before 23.2R1-EVO.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A Use of Incorrect Operator\\n\\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\u003cbr\u003e\u003cbr\u003eWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\u003cbr\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\u003c/span\u003e\u003cbr\u003eThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\u003cbr\u003e\u003cp\u003eThis issue affects Junos OS Evolved:\u003c/p\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cul\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e24.2R2-EVO versions before 24.2R2-S1-EVO,\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003eThis issue doesn\u0027t affect Junos OS Evolved versions before 23.2R1-EVO.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-480\", \"description\": \"CWE-480 Use of Incorrect Operator\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"A system will only be affected by this vulnerability if like in the following example a\\n\\nfirewall filter applied to the lo0 or re:mgmt interface references a prefix list with the \u0027from prefix-list\u0027 clause, and that prefix list contains more than 10 entries:\\n\\n[ policy-options prefix-list \u003cprefix-list name\u003e \u003cprefix1\u003e ]\\n...\\n\\n\\n[ policy-options prefix-list \u003cprefix-list name\u003e\\n\\n\u003cprefix11\u003e ]\\n...\\n[ firewall family \u003cinet/inet6\u003e filter \u003cfilter name\u003e term \u003cterm name\u003e from prefix-list \\n\\n\u003cprefix-list name\u003e\\n\\n ]\\n[ interfaces \u003clo0 unit \u003cunit\u003e / re:mgmt\u003c0/1\u003e unit \\n\\n\u003cunit\u003e\u003e family \u003cinet/inet6\u003e filter \u003cinput/output\u003e \\n\\n\u003cfilter name\u003e\\n\\n ]\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A system will only be affected by this vulnerability if like in the following example a\\n\\nfirewall filter applied to the lo0 or re:mgmt interface references a prefix list with the \u0027from prefix-list\u0027 clause, and that prefix list contains more than 10 entries:\u003cbr\u003e\u003cbr\u003e\u003ctt\u003e[ policy-options prefix-list \u0026lt;prefix-list name\u0026gt; \u0026lt;prefix1\u0026gt; ]\u003cbr\u003e...\u003cbr\u003e\\n\\n[ policy-options prefix-list \u0026lt;prefix-list name\u0026gt;\\n\\n\u0026lt;prefix11\u0026gt; ]\u003cbr\u003e...\u003cbr\u003e[ firewall family \u0026lt;inet/inet6\u0026gt; filter \u0026lt;filter name\u0026gt; term \u0026lt;term name\u0026gt; from prefix-list \\n\\n\u0026lt;prefix-list name\u0026gt;\\n\\n ]\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e[ interfaces \u0026lt;lo0 unit \u0026lt;unit\u0026gt; / re:mgmt\u0026lt;0/1\u0026gt; unit \\n\\n\u0026lt;unit\u0026gt;\u0026gt; family \u0026lt;inet/inet6\u0026gt; filter \u0026lt;input/output\u0026gt; \\n\\n\u0026lt;filter name\u0026gt;\\n\\n ]\u003c/span\u003e\u003c/tt\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2025-07-18T07:16:09.464Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-52985\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-18T07:16:09.464Z\", \"dateReserved\": \"2025-06-23T18:23:44.546Z\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"datePublished\": \"2025-07-11T15:09:58.361Z\", \"assignerShortName\": \"juniper\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0583
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Apstra | Apstra versions antérieures à 6.0.0 | ||
| Juniper Networks | Security Director | Security Director versions antérieures à 24.4.1-1703 | ||
| Juniper Networks | CTPView | CTPview versions antérieures à 9.3R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apstra versions ant\u00e9rieures \u00e0 6.0.0",
"product": {
"name": "Apstra",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director versions ant\u00e9rieures \u00e0 24.4.1-1703",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPview versions ant\u00e9rieures \u00e0 9.3R2",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52984"
},
{
"name": "CVE-2020-10136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10136"
},
{
"name": "CVE-2024-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
},
{
"name": "CVE-2024-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
},
{
"name": "CVE-2025-52950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52950"
},
{
"name": "CVE-2025-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52983"
},
{
"name": "CVE-2025-52952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52952"
},
{
"name": "CVE-2025-52963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52963"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-26466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
},
{
"name": "CVE-2024-23984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
},
{
"name": "CVE-2025-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52986"
},
{
"name": "CVE-2025-52988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52988"
},
{
"name": "CVE-2025-52949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52949"
},
{
"name": "CVE-2025-6549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6549"
},
{
"name": "CVE-2025-52954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52954"
},
{
"name": "CVE-2024-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7595"
},
{
"name": "CVE-2025-52947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52947"
},
{
"name": "CVE-2025-52958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52958"
},
{
"name": "CVE-2025-52964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52964"
},
{
"name": "CVE-2025-52946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52946"
},
{
"name": "CVE-2024-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
},
{
"name": "CVE-2025-52951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52951"
},
{
"name": "CVE-2025-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23019"
},
{
"name": "CVE-2025-52955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52955"
},
{
"name": "CVE-2025-23018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23018"
},
{
"name": "CVE-2025-52948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52948"
},
{
"name": "CVE-2025-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52981"
},
{
"name": "CVE-2024-24968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
},
{
"name": "CVE-2025-52953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52953"
},
{
"name": "CVE-2025-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52985"
},
{
"name": "CVE-2025-52989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52989"
},
{
"name": "CVE-2025-52980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52980"
},
{
"name": "CVE-2025-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52982"
},
{
"name": "CVE-2025-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30661"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0583",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52988",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52963",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52958",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52985",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52986",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2024-3596",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52989",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52981",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52983",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52946",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52954",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52953",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52947",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52949",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-26466",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52955",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52952",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-30661",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52951",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52984",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52948",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52964",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52982",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52950",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52980",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-6549",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
}
]
}
CERTFR-2025-AVI-0583
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Apstra | Apstra versions antérieures à 6.0.0 | ||
| Juniper Networks | Security Director | Security Director versions antérieures à 24.4.1-1703 | ||
| Juniper Networks | CTPView | CTPview versions antérieures à 9.3R2 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apstra versions ant\u00e9rieures \u00e0 6.0.0",
"product": {
"name": "Apstra",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Security Director versions ant\u00e9rieures \u00e0 24.4.1-1703",
"product": {
"name": "Security Director",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPview versions ant\u00e9rieures \u00e0 9.3R2",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO, 22.2R3-S6-EVO, 22.2R3-S7-EVO, 22.3R3-S3-EVO, 22.4R3-S5-EVO, 22.4R3-S6-EVO, 22.4R3-S7-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S3-EVO, 23.2R2-S4-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S4-EVO, 23.4R2-S5-EVO, 24.2R1-EVO, 24.2R2-EVO, 24.2R2-S1-EVO, 24.4R1-EVO, 24.4R1-S2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.1R1-EVO et 25.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9, 21.4R3-S10, 21.4R3-S11, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.2R3-S1, 22.2R3-S4, 22.2R3-S5, 22.2R3-S6, 22.2R3-S7, 22.3R3-S3, 22.4R2, 22.4R3-S2, 22.4R3-S5, 22.4R3-S6, 22.4R3-S7, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S3, 23.2R2-S4, 23.4R1-S2, 23.4R2, 23.4R2-S3, 23.4R2-S4, 23.4R2-S5, 24.2R1, 24.2R1-S1, 24.2R1-S2, 24.2R2, 24.2R2-S1, 24.4R1, 24.4R1-S2, 24.4R1-S3, 24.4R2 et 25.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52984"
},
{
"name": "CVE-2020-10136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10136"
},
{
"name": "CVE-2024-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
},
{
"name": "CVE-2024-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
},
{
"name": "CVE-2025-52950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52950"
},
{
"name": "CVE-2025-52983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52983"
},
{
"name": "CVE-2025-52952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52952"
},
{
"name": "CVE-2025-52963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52963"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-26466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
},
{
"name": "CVE-2024-23984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
},
{
"name": "CVE-2025-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52986"
},
{
"name": "CVE-2025-52988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52988"
},
{
"name": "CVE-2025-52949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52949"
},
{
"name": "CVE-2025-6549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6549"
},
{
"name": "CVE-2025-52954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52954"
},
{
"name": "CVE-2024-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7595"
},
{
"name": "CVE-2025-52947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52947"
},
{
"name": "CVE-2025-52958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52958"
},
{
"name": "CVE-2025-52964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52964"
},
{
"name": "CVE-2025-52946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52946"
},
{
"name": "CVE-2024-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
},
{
"name": "CVE-2025-52951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52951"
},
{
"name": "CVE-2025-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23019"
},
{
"name": "CVE-2025-52955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52955"
},
{
"name": "CVE-2025-23018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23018"
},
{
"name": "CVE-2025-52948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52948"
},
{
"name": "CVE-2025-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52981"
},
{
"name": "CVE-2024-24968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
},
{
"name": "CVE-2025-52953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52953"
},
{
"name": "CVE-2025-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52985"
},
{
"name": "CVE-2025-52989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52989"
},
{
"name": "CVE-2025-52980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52980"
},
{
"name": "CVE-2025-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52982"
},
{
"name": "CVE-2025-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30661"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0583",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52988",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52963",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52958",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52985",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52986",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2024-3596",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52989",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52981",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52983",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52946",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52954",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52953",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52947",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52949",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Apstra-Multiple-Vulnerabilities-resolved-in-Intel-microcode-package"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-26466",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52955",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52952",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-30661",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52951",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52984",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52948",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52964",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52982",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52950",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-52980",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2025-6549",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks 2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
}
]
}
FKIE_CVE-2025-52985
Vulnerability from fkie_nvd - Published: 2025-07-11 16:15 - Updated: 2026-01-23 17:06| URL | Tags | ||
|---|---|---|---|
| sirt@juniper.net | https://supportportal.juniper.net/JSA100091 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | junos_os_evolved | 23.2 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 23.4 | |
| juniper | junos_os_evolved | 24.2 | |
| juniper | junos_os_evolved | 24.4 | |
| juniper | junos_os_evolved | 24.4 | |
| juniper | junos_os_evolved | 24.4 | |
| juniper | junos_os_evolved | 24.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "9A903B31-D9E5-43FA-B09F-7E7769803720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "2E58987A-D7B7-4FFF-9969-E8FD76AE2BE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:*",
"matchCriteriaId": "E779C0D4-A8F7-4976-B3C8-B9802B96E715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "080BEA58-9667-4C2C-810D-DC1187DB67DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:*",
"matchCriteriaId": "B32ADA05-5F5D-45B6-BB7B-3FA6A6F229F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "D6526E82-A6A6-4A65-9B01-B3FCB947F44E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "CF3B74FA-DF84-4E3E-BCF9-44EEF9E45910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "25DA0DD2-E974-448C-BD05-ED6FCA4725FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Use of Incorrect Operator\n\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\n\nWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\n\n\nThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\nThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\nThis issue affects Junos OS Evolved:\n\n * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\n * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\n * 24.2R2-EVO versions before 24.2R2-S1-EVO,\n * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\n\n\nThis issue doesn\u0027t affect Junos OS Evolved versions before 23.2R1-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de uso de operador incorrecto en el firewall del motor de enrutamiento de Juniper Networks Junos OS Evolved permite a un atacante no autenticado basado en la red eludir las restricciones de seguridad. Cuando un filtro de firewall aplicado a la interfaz lo0 o re:mgmt hace referencia a una lista de prefijos con \"from prefix-list\", y dicha lista contiene m\u00e1s de 10 entradas, la lista de prefijos no coincide y los paquetes con destino o origen en el dispositivo local no se filtran. Este problema afecta a los filtros de firewall aplicados a las interfaces re:mgmt como entrada y salida, pero solo a los filtros de firewall aplicados a la interfaz lo0 como salida. Este problema es aplicable a IPv4 e IPv6, ya que una lista de prefijos puede contener prefijos de IPv4 e IPv6. Este problema afecta a Junos OS Evolved: * versiones 23.2R2-S3-EVO anteriores a 23.2R2-S4-EVO, * versiones 23.4R2-S3-EVO anteriores a 23.4R2-S5-EVO, * versiones 24.2R2-EVO anteriores a 24.2R2-S1-EVO, * versiones 24.4-EVO anteriores a 24.4R1-S3-EVO y 24.4R2-EVO. Este problema no afecta a las versiones de Junos OS Evolved anteriores a 23.2R1-EVO."
}
],
"id": "CVE-2025-52985",
"lastModified": "2026-01-23T17:06:03.340",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "sirt@juniper.net",
"type": "Secondary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "sirt@juniper.net",
"type": "Secondary"
}
]
},
"published": "2025-07-11T16:15:25.860",
"references": [
{
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
],
"url": "https://supportportal.juniper.net/JSA100091"
}
],
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-480"
}
],
"source": "sirt@juniper.net",
"type": "Secondary"
}
]
}
GHSA-C7MR-H37W-H53J
Vulnerability from github – Published: 2025-07-11 18:30 – Updated: 2025-07-11 18:30A Use of Incorrect Operator
vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.
When a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with 'from prefix-list', and that prefix list contains more than 10 entries, the prefix list doesn't match and packets destined to or from the local device are not filtered.
This issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output. This issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes. This issue affects Junos OS Evolved:
- 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,
- 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,
- 24.2R2-EVO versions before 24.2R2-S1-EVO,
- 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.
This issue doesn't not affect Junos OS Evolved versions before 23.2R1-EVO.
{
"affected": [],
"aliases": [
"CVE-2025-52985"
],
"database_specific": {
"cwe_ids": [
"CWE-480"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-11T16:15:25Z",
"severity": "MODERATE"
},
"details": "A Use of Incorrect Operator\n\nvulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.\n\nWhen a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with \u0027from prefix-list\u0027, and that prefix list contains more than 10 entries, the prefix list doesn\u0027t match and packets destined to or from the local device are not filtered.\n\n\nThis issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.\nThis issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.\nThis issue affects Junos OS Evolved:\n\n * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,\n * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,\n * 24.2R2-EVO versions before 24.2R2-S1-EVO,\n * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.\n\n\nThis issue doesn\u0027t not affect Junos OS Evolved versions before 23.2R1-EVO.",
"id": "GHSA-c7mr-h37w-h53j",
"modified": "2025-07-11T18:30:33Z",
"published": "2025-07-11T18:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52985"
},
{
"type": "WEB",
"url": "https://supportportal.juniper.net/JSA100091"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
WID-SEC-W-2025-1519
Vulnerability from csaf_certbund - Published: 2025-07-09 22:00 - Updated: 2025-10-08 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Juniper JUNOS Evolved
Juniper / JUNOS
|
cpe:/o:juniper:junos:evolved
|
Evolved | |
|
Juniper SRX Series
Juniper
|
cpe:/h:juniper:srx_service_gateways:-
|
— | |
|
Juniper Security Director
Juniper
|
cpe:/a:juniper:security_director:-
|
— | |
|
Juniper MX Series
Juniper
|
cpe:/h:juniper:mx:-
|
— | |
|
Juniper Junos Space <24.1R4
Juniper / Junos Space
|
<24.1R4 | ||
|
Juniper Junos Space Security Director <24.1R4
Juniper / Junos Space
|
Security Director <24.1R4 | ||
|
Juniper JUNOS
Juniper / JUNOS
|
cpe:/o:juniper:junos:-
|
— |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://supportportal.juniper.net/s/global-search… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
| https://supportportal.juniper.net/s/article/2025-… | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nJuniper Security Director erm\u00f6glicht die Verwaltung und Kontrolle von Sicherheitsrichtlinien f\u00fcr lokale Infrastrukturen \u00fcber eine zentrale, webbasierte Benutzeroberfl\u00e4che.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Juniper JUNOS, Juniper MX Series, Juniper SRX Series und Juniper Security Director ausnutzen, um Daten zu manipulieren oder offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, Code auszuf\u00fchren, einen Denial of Service zu verursachen oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1519 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1519.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1519 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1519"
},
{
"category": "external",
"summary": "Juniper Security Advisories vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sortCriteria=date%20descending\u0026f-sf_primarysourcename=Knowledge\u0026f-sf_articletype=Security%20Advisories\u0026numberOfResults=30"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2024-3596 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Vulnerability-in-the-RADIUS-protocol-for-Subscriber-Management-Blast-RADIUS-CVE-2024-3596"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-26466-resolved-in-9-3R2-release vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-CTPView-OpenSSH-vulnerability-CVE-2025-26466-resolved-in-9-3R2-release"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-30661 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Low-privileged-user-can-cause-script-to-run-as-root-leading-to-privilege-escalation-CVE-2025-30661"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52946 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-traceoptions-enabled-receipt-of-malformed-AS-PATH-causes-RPD-crash-CVE-2025-52946"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52947 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-ACX-Series-When-hot-standby-mode-is-configured-for-an-L2-circuit-interface-flap-causes-the-FEB-to-crash"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52948 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Specific-unknown-traffic-pattern-causes-FPC-and-system-to-crash-when-packet-capturing-is-enabled-CVE-2025-52948"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52949 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-environment-receipt-of-a-specifically-malformed-BGP-update-causes-RPD-crash-CVE-2025-52949"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52950 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-multiple-endpoints-in-web-interface-CVE-2025-52950"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52951 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-IPv6-firewall-filter-fails-to-match-payload-protocol-CVE-2025-52951"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52952 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-with-MPC-BUILTIN-MPC-1-through-MPC-9-Receipt-and-processing-of-a-malformed-packet-causes-one-or-more-FPCs-to-crash-CVE-2025-52952"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52953 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-unauthenticated-adjacent-attacker-sending-a-valid-BGP-UPDATE-packet-forces-a-BGP-session-reset-CVE-2025-52953"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52954 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-A-low-privileged-user-can-execute-CLI-commands-and-modify-the-configuration-compromise-the-system-CVE-2025-52954"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52955 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-When-jflow-sflow-is-enabled-receipt-of-specific-route-updates-causes-rpd-crash-CVE-2025-52955"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52958 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-route-validation-is-enabled-BGP-connection-establishment-failure-causes-RPD-crash-CVE-2025-52958"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52963 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-A-low-privileged-user-can-disable-an-interface-CVE-2025-52963"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52964 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-BGP-UPDATE-causes-an-rpd-crash-on-devices-with-BGP-multipath-configured-CVE-2025-52964"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52980 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX300-Series-Upon-receiving-a-specific-valid-BGP-UPDATE-message-rpd-will-crash-CVE-2025-52980"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52981 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2025-52981"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52982 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-MX-Series-When-specific-SIP-packets-are-processed-the-MS-MPC-will-crash-CVE-2025-52982"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52983 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-After-removing-ssh-public-key-authentication-root-can-still-log-in-CVE-2025-52983"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52984 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-a-static-route-points-to-an-unreachable-next-hop-and-a-gNMI-query-for-this-route-is-processed-RPD-crashes-CVE-2025-52984"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52985 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-When-a-control-plane-firewall-filter-refers-to-a-prefix-list-with-more-then-10-entries-it-s-not-matching-CVE-2025-52985"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52986 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-RIB-sharding-is-configured-each-time-a-show-command-is-executed-RPD-memory-leaks-CVE-2025-52986"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52988 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Privilege-escalation-via-CLI-command-request-system-logout-CVE-2025-52988"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-52989 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Annotate-configuration-command-can-be-used-for-privilege-escalation-CVE-2025-52989"
},
{
"category": "external",
"summary": "Juniper Security Bulletin CVE-2025-6549 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-SRX-Series-J-Web-can-be-exposed-on-additional-interfaces-CVE-2025-6549"
},
{
"category": "external",
"summary": "Juniper Security Bulletin VU#199397 vom 2025-07-09",
"url": "https://supportportal.juniper.net/s/article/2025-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-for-Insecure-Implementation-of-Tunneling-Protocols-GRE-IPIP-4in6-6in4-VU-199397"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103141 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103139 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103138 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA103140 vom 2024-10-08",
"url": "https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-10-08T22:00:00.000+00:00",
"generator": {
"date": "2025-10-09T07:29:59.775+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1519",
"initial_release_date": "2025-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-21162, EUVD-2025-21161, EUVD-2025-21160, EUVD-2025-21158, EUVD-2025-21157, EUVD-2025-21165, EUVD-2025-21167, EUVD-2025-21156, EUVD-2025-21155, EUVD-2025-21166, EUVD-2025-21163"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T032362",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
},
{
"category": "product_version",
"name": "Evolved",
"product": {
"name": "Juniper JUNOS Evolved",
"product_id": "T042696",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:evolved"
}
}
}
],
"category": "product_name",
"name": "JUNOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Security Director \u003c24.1R4",
"product": {
"name": "Juniper Junos Space Security Director \u003c24.1R4",
"product_id": "T047484"
}
},
{
"category": "product_version",
"name": "Security Director 24.1R4",
"product": {
"name": "Juniper Junos Space Security Director 24.1R4",
"product_id": "T047484-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r4::security_director"
}
}
},
{
"category": "product_version_range",
"name": "\u003c24.1R4",
"product": {
"name": "Juniper Junos Space \u003c24.1R4",
"product_id": "T047485"
}
},
{
"category": "product_version",
"name": "24.1R4",
"product": {
"name": "Juniper Junos Space 24.1R4",
"product_id": "T047485-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r4"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
},
{
"category": "product_name",
"name": "Juniper MX Series",
"product": {
"name": "Juniper MX Series",
"product_id": "918766",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:mx:-"
}
}
},
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T045305",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Security Director",
"product": {
"name": "Juniper Security Director",
"product_id": "T045307",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:security_director:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-3596",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2025-26466",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-26466"
},
{
"cve": "CVE-2025-30661",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-30661"
},
{
"cve": "CVE-2025-52946",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52946"
},
{
"cve": "CVE-2025-52947",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52947"
},
{
"cve": "CVE-2025-52948",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52948"
},
{
"cve": "CVE-2025-52949",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52949"
},
{
"cve": "CVE-2025-52950",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52950"
},
{
"cve": "CVE-2025-52951",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52951"
},
{
"cve": "CVE-2025-52952",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52952"
},
{
"cve": "CVE-2025-52953",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52953"
},
{
"cve": "CVE-2025-52954",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52954"
},
{
"cve": "CVE-2025-52955",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52955"
},
{
"cve": "CVE-2025-52958",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52958"
},
{
"cve": "CVE-2025-52963",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52963"
},
{
"cve": "CVE-2025-52964",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52964"
},
{
"cve": "CVE-2025-52980",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52980"
},
{
"cve": "CVE-2025-52981",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52981"
},
{
"cve": "CVE-2025-52982",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52982"
},
{
"cve": "CVE-2025-52983",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52983"
},
{
"cve": "CVE-2025-52984",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52984"
},
{
"cve": "CVE-2025-52985",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52985"
},
{
"cve": "CVE-2025-52986",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52986"
},
{
"cve": "CVE-2025-52988",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52988"
},
{
"cve": "CVE-2025-52989",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-52989"
},
{
"cve": "CVE-2025-6549",
"product_status": {
"known_affected": [
"T042696",
"T045305",
"T045307",
"918766",
"T047485",
"T047484",
"T032362"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-6549"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.