Improper Input Validation in Juniper DHCP Daemon Affects Junos OS
CVE-2025-30648
7.1HIGH
Summary
An improper input validation vulnerability in the Juniper DHCP Daemon (jdhcpd) within Junos OS and Junos OS Evolved can be exploited by unauthenticated, adjacent attackers, leading to a crashing of the jdhcpd process. This flaw allows attackers to send specifically crafted malformed DHCP packets, which can cause the service to become unavailable, resulting in a Denial of Service (DoS). Although the process will attempt to restart automatically, the incident may still disrupt network operations, especially when dhcp-security is enabled.
Affected Version(s)
Junos OS 0 < 21.2R3-S9
Junos OS 21.4 < 21.4R3-S10
Junos OS 22.2 < 22.2R3-S6
References
CVSS V4
Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved