Denial of Service Vulnerability in Juniper Networks Junos OS Routing Protocol Daemon
CVE-2025-21597
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 9 April 2025
Badges
Summary
A vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved can be exploited by an unauthenticated BGP peer, enabling the attacker to trigger a Denial of Service (DoS). When certain configurations are in place—namely BGP rib-sharding and update-threading—a BGP peer can cause rpd to crash and restart through specific timing of peer flaps. This behavior persists, leading to continuous disruptions in service. The vulnerability affects both eBGP and iBGP implementations for IPv4 and IPv6, requiring at least one established BGP session from the remote attacker, and may impact users with or without logical systems enabled.
Affected Version(s)
Junos OS 0 < 20.4R3-S8
Junos OS 21.2 < 21.2R3-S6
Junos OS 21.3 < 21.3R3-S5
References
CVSS V4
Timeline
- đź‘ľ
Exploit known to exist
Vulnerability published
Vulnerability Reserved