Improper Input Validation in Juniper DHCP Daemon Affects Junos OS
CVE-2025-30648
Key Information:
- Vendor
Juniper Networks
- Status
- Vendor
- CVE Published:
- 9 April 2025
Badges
What is CVE-2025-30648?
An improper input validation vulnerability in the Juniper DHCP Daemon (jdhcpd) within Junos OS and Junos OS Evolved can be exploited by unauthenticated, adjacent attackers, leading to a crashing of the jdhcpd process. This flaw allows attackers to send specifically crafted malformed DHCP packets, which can cause the service to become unavailable, resulting in a Denial of Service (DoS). Although the process will attempt to restart automatically, the incident may still disrupt network operations, especially when dhcp-security is enabled.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Junos OS 0 < 21.2R3-S9
Junos OS 21.4 < 21.4R3-S10
Junos OS 22.2 < 22.2R3-S6
References
CVSS V4
Timeline
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved