Memory Management Flaw in Juniper Networks Junos OS Evolved IPv6 Configuration
CVE-2025-21599
7.5HIGH
Summary
A vulnerability in the Juniper Tunnel Driver (jtd) of Junos OS Evolved allows unauthenticated network-based attackers to exploit a memory management flaw when processing specifically malformed IPv6 packets. This leads to an inability to free kernel memory, resulting in memory exhaustion and potentially causing system crashes, thereby creating a Denial of Service (DoS) condition. Systems configured with IPv6 are particularly susceptible, as continuous receipt of these packets can sustain a DoS impact. Affected versions are those from 22.4-EVO onwards, specifically before minor revisions indicated, while versions prior to 22.4R1-EVO remain unaffected.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published