Home

Description

A NULL Pointer Dereference vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS on MX, SRX and EX Series allows a local attacker with low privileges to cause a Denial-of-Service (DoS). When a user executes the 'show chassis' command with specifically crafted options, chassisd will crash and restart. Due to this all components but the Routing Engine (RE) in the chassis are reinitialized, which leads to a complete service outage, which the system automatically recovers from. This issue affects: Junos OS on MX, SRX and EX Series: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2.

PUBLISHED Reserved 2025-09-23 | Published 2026-01-15 | Updated 2026-01-15 | Assigner juniper




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M

Problem types

CWE-476 NULL Pointer Dereference

Product status

Default status
unaffected

Any version before 22.4R3-S8
affected

23.2 (semver) before 23.2R2-S5
affected

23.4 (semver) before 23.4R2-S6
affected

24.2 (semver) before 24.2R2-S2
affected

24.4 (semver) before 24.4R2
affected

References

supportportal.juniper.net/ vendor-advisory

kb.juniper.net/JSA103173 vendor-advisory

cve.org (CVE-2025-60007)

nvd.nist.gov (CVE-2025-60007)

Download JSON