Reachable Assertion Vulnerability in Junos OS and Junos OS Evolved by Juniper Networks
CVE-2025-52964

7.1HIGH

Key Information:

Vendor
CVE Published:
11 July 2025

Badges

👾 Exploit Exists

What is CVE-2025-52964?

A vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks’ Junos OS and Junos OS Evolved permits unauthenticated attackers to trigger a Denial of Service (DoS). Specifically, this occurs when the device receives a carefully crafted BGP UPDATE packet, causing the rpd to crash and subsequently restart. This loop can lead to a persistent DoS condition. For this vulnerability to be exploited, BGP multipath must be configured using 'pause-computation-during-churn', with attacker-sent paths from an established BGP peer.

Affected Version(s)

Junos OS 0 < 21.4R3-S7

Junos OS 22.3 < 22.3R3-S3

Junos OS 22.4 < 22.4R3-S5

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-52964 : Reachable Assertion Vulnerability in Junos OS and Junos OS Evolved by Juniper Networks