We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21597

Junos OS and Junos OS Evolved: When BGP rib-sharding and update-threading are configured and a peer flaps, an rpd core is observed



Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS). On all Junos OS and Junos OS Evolved platforms, when BGP rib-sharding and update-threading are configured, and a BGP peer flap is done with specific timing, rpd crashes and restarts. Continuous peer flapping at specific time intervals will result in a sustained Denial of Service (DoS) condition. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session. The issue can occur with or without logical-systems enabled. This issue affects: Junos OS: * All versions before 20.4R3-S8, * 21.2 versions before 21.2R3-S6, * 21.3 versions before 21.3R3-S5, * 21.4 versions before 21.4R3-S4, * 22.1 versions before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R3, * 22.4 versions before 22.4R3. Junos OS Evolved: * All versions before 21.2R3-S6-EVO, * 21.3-EVO versions before 21.3R3-S5-EVO, * 21.4-EVO versions before 21.4R3-S4-EVO, * 22.1-EVO versions before 22.1R3-S3-EVO, * 22.2-EVO versions before :22.2R3-S1-EVO, * 22.3-EVO versions before 22.3R3-EVO, * 22.4-EVO versions before 22.4R3-EVO.

Reserved 2024-12-26 | Published 2025-04-09 | Updated 2025-04-10 | Assigner juniper


MEDIUM: 5.3CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

MEDIUM: 6.0CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/R:A

Problem types

CWE-754 Improper Check for Unusual or Exceptional Conditions

Product status

Default status
unaffected

Any version before 20.4R3-S8
affected

21.2 before 21.2R3-S6
affected

21.3 before 21.3R3-S5
affected

21.4 before 21.4R3-S4
affected

22.1 before 22.1R3-S3
affected

22.2 before 22.2R3-S1
affected

22.3 before 22.3R3
affected

22.4 before 22.4R3
affected

Default status
unaffected

Any version before 21.2R3-S6-EVO
affected

21.3-EVO before 21.3R3-S5-EVO
affected

21.4-EVO before 21.4R3-S4-EVO
affected

22.1-EVO before 22.1R3-S3-EVO
affected

22.2-EVO before 22.2R3-S1-EVO
affected

22.3-EVO before 22.3R3-EVO
affected

22.4-EVO before 22.4R3-EVO
affected

Timeline

2024-04-09:Initial Publication

References

kb.juniper.net/JSA96451 vendor-advisory

cve.org (CVE-2025-21597)

nvd.nist.gov (CVE-2025-21597)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21597

Support options

Helpdesk Chat, Email, Knowledgebase