Home

Description

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer. This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring: [ protocols bgp ... disable-4byte-as ] Established BGP sessions can be checked by executing: show bgp neighbor <IP address> | match "4 byte AS" This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.

PUBLISHED Reserved 2025-09-23 | Published 2026-01-15 | Updated 2026-01-15 | Assigner juniper




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M

Problem types

CWE-126 Buffer Over-read

Product status

Default status
unaffected

Any version before 22.4R3-S8
affected

23.2 (semver) before 23.2R2-S5
affected

23.4 (semver) before 23.4R2-S6
affected

24.2 (semver) before 24.2R2-S2
affected

24.4 (semver) before 24.4R2
affected

Default status
unaffected

Any version before 22.4R3-S8-EVO
affected

23.2 (semver) before 23.2R2-S5-EVO
affected

23.4 (semver) before 23.4R2-S6-EVO
affected

24.2 (semver) before 24.2R2-S2-EVO
affected

24.4 (semver) before 24.4R2-EVO
affected

Credits

Juniper SIRT would like to acknowledge and thank Craig Dods from Meta’s Infrastructure Security Engineering team for responsibly reporting this vulnerability. finder

References

supportportal.juniper.net/ vendor-advisory

kb.juniper.net/JSA103166 vendor-advisory

cve.org (CVE-2025-60003)

nvd.nist.gov (CVE-2025-60003)

Download JSON