Improper Encoding Vulnerability in Junos OS by Juniper Networks
CVE-2025-30657
Summary
An improper encoding vulnerability exists within the Sampling Route Record Daemon (SRRD) of Junos OS, allowing unauthenticated, network-based attackers to disrupt service. Specifically, when a device configured for flow-monitoring receives a malformed BGP update message, it is processed correctly by the routing protocol daemon (rpd), but an encoding error during its transfer to the SRRD causes the service to crash. This leads to temporary disruption of jflow processing until it's automatically restarted, although it does not affect traffic forwarding itself. To mitigate this vulnerability, it is essential for users to ensure their systems are updated to versions that are not impacted.
Affected Version(s)
Junos OS 0 < 21.2R3-S9
Junos OS 21.4 < 21.4R3-S10
Junos OS 22.2 < 22.2R3-S6
References
CVSS V4
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved