CVE-2025-30661
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos | 24.4 |
| juniper | junos | 23.2 |
| juniper | junos | 24.2 |
| juniper | junos | 23.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Incorrect Permission Assignment for Critical Resource in Juniper Networks Junos OS line card script processing. It allows a local, low-privileged user to install scripts that will be executed as root during system boot. This means the user can escalate their privileges to root level by placing a script on the router, which the system runs with full administrative rights.
How can this vulnerability impact me? :
The vulnerability can lead to privilege escalation, allowing a local user to gain complete control of the affected system. This could result in unauthorized access, modification, or disruption of network operations, potentially compromising the security and stability of the network infrastructure.