We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52986

Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks



Description

A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart. The leak can be monitored with the CLI command: show task memory detail | match task_shard_mgmt_cookie where the allocated memory in bytes can be seen to continuously increase with each exploitation. This issue affects: Junos OS: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S11, * 22.2 versions before 22.2R3-S7, * 22.4 versions before 22.4R3-S7, * 23.2 versions before 23.2R2-S4,  * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2, * 24.4 versions before 24.4R1-S2, 24.4R2; Junos OS Evolved: * all versions before 22.2R3-S7-EVO * 22.4-EVO versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO,  * 24.4-EVO versions before 24.4R2-EVO.

Reserved 2025-06-23 | Published 2025-07-11 | Updated 2025-07-11 | Assigner juniper


MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M

Problem types

CWE-401 Missing Release of Memory after Effective Lifetime

Product status

Default status
unaffected

Any version before 21.2R3-S9
affected

21.4 before 21.4R3-S11
affected

22.2 before 22.2R3-S7
affected

22.4 before 22.4R3-S7
affected

23.2 before 23.2R2-S4
affected

23.4 before 23.4R2-S4
affected

24.2 before 24.2R2
affected

24.4 before 24.4R1-S2, 24.4R2
affected

Default status
unaffected

Any version before 22.2R3-S7-EVO
affected

22.4-EVO before 22.4R3-S7-EVO
affected

23.2-EVO before 23.2R2-S4-EVO
affected

23.4-EVO before 23.4R2-S4-EVO
affected

24.2-EVO before 24.2R2-EVO
affected

24.4-EVO before 24.4R2-EVO
affected

References

supportportal.juniper.net/JSA100092 vendor-advisory

cve.org (CVE-2025-52986)

nvd.nist.gov (CVE-2025-52986)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52986

Support options

Helpdesk Chat, Email, Knowledgebase