CVE-2025-52947
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-755 | The product does not handle or incorrectly handles an exceptional condition. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Handling of Exceptional Conditions in the route processing of Juniper Networks Junos OS on certain end-of-life ACX Series platforms. It allows an attacker to cause the Forwarding Engine Board (FEB) to crash by flapping an interface, which leads to a Denial of Service (DoS). Specifically, on affected ACX devices, FEB0 crashes when the primary path port of the L2 circuit IGP on the local device goes down, but only if 'hot-standby' mode is configured for the L2 circuit.
How can this vulnerability impact me? :
The impact of this vulnerability is a Denial of Service (DoS) condition. An attacker can cause the Forwarding Engine Board to crash by flapping an interface, which disrupts network operations on affected Juniper ACX devices. This can lead to network outages or degraded performance until the device is recovered or rebooted.