Improper Input Validation in Juniper DHCP Daemon Affects Junos OS
CVE-2025-30648

7.1HIGH

Key Information:

Vendor
CVE Published:
9 April 2025

Badges

👾 Exploit Exists

Summary

An improper input validation vulnerability in the Juniper DHCP Daemon (jdhcpd) within Junos OS and Junos OS Evolved can be exploited by unauthenticated, adjacent attackers, leading to a crashing of the jdhcpd process. This flaw allows attackers to send specifically crafted malformed DHCP packets, which can cause the service to become unavailable, resulting in a Denial of Service (DoS). Although the process will attempt to restart automatically, the incident may still disrupt network operations, especially when dhcp-security is enabled.

Affected Version(s)

Junos OS 0 < 21.2R3-S9

Junos OS 21.4 < 21.4R3-S10

Junos OS 22.2 < 22.2R3-S6

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-30648 : Improper Input Validation in Juniper DHCP Daemon Affects Junos OS | SecurityVulnerability.io