Junos OS Evolved: PTX Series: When a firewall filter rejects traffic these packets are erroneously sent to the RE
CVE-2025-59958

6.9MEDIUM

Key Information:

Vendor
CVE Published:
9 October 2025

Badges

šŸ‘¾ Exploit Exists

What is CVE-2025-59958?

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to cause impact to confidentiality and availability.

When an output firewall filter is configured with one or moreĀ terms where the action is 'reject', packets matching these terms areĀ erroneously sent to the Routing Engine (RE) and further processed there.Ā Processing of these packets will consume limited RE resources. Also responses from the RE back to the source of this traffic could reveal confidential information about the affected device. This issue only applies to firewall filters applied to WAN or revenue interfaces, so not the mgmt or lo0 interface of the routing-engine, nor any input filters.

This issue affects Junos OS Evolved on PTX Series:

  • all versions before 22.4R3-EVO,
  • 23.2 versions before 23.2R2-EVO.

Affected Version(s)

Junos OS Evolved PTX Series 0 < 22.4R3-EVO

Junos OS Evolved PTX Series 23.2 < 23.2R2-EVO

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • šŸ‘¾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-59958 : Improper Check Vulnerability in Junos OS Evolved Affecting Juniper Networks PTX Series