Out-of-Bounds Read Vulnerability in Juniper Networks Junos OS and Junos OS Evolved
CVE-2025-21600

7.1HIGH

Key Information:

Vendor
CVE Published:
9 January 2025

Badges

👾 Exploit Exists

Summary

An Out-of-Bounds Read vulnerability has been discovered in Juniper Networks' Junos OS and Junos OS Evolved. This vulnerability allows an unauthenticated, logically adjacent BGP peer to send a specifically malformed BGP packet, which may lead to the routing protocol daemon (rpd) crashing and restarting. Consequently, this can result in a Denial of Service (DoS) condition. The vulnerability is pertinent to systems with BGP traceoptions enabled or those using BGP family traffic-engineering (BGP-LS). Both iBGP and eBGP configurations for IPv4 and IPv6 are impacted, making it vital for operators to ensure their systems are updated to versions that address this issue.

Affected Version(s)

Junos OS 21.4 < 21.4R3-S9

Junos OS 22.2 < 22.2R3-S5

Junos OS 22.3 < 22.3R3-S4

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

Credit

Juniper SIRT would like to acknowledge and thank Craig Dods from Meta’s Infrastructure Security Engineering team for responsibly reporting this vulnerability.
.