CVE-2025-52948
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos | 21.4 |
| juniper | junos | 24.2 |
| juniper | junos | 21.2r3-s9 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.2 |
| juniper | junos | 23.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-755 | The product does not handle or incorrectly handles an exceptional condition. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper handling of exceptional conditions in the Berkeley Packet Filter (BPF) processing within Juniper Networks Junos OS. Due to a rare timing issue (race condition) when a BPF instance is cloned, an internal structure leakage occurs, which can cause the Flexible PIC Concentrator (FPC) and the entire system to crash and restart. The vulnerability is triggered by sending specific, unknown traffic patterns, especially when packet capturing is enabled.
How can this vulnerability impact me? :
The vulnerability can cause the affected Junos OS system to crash and restart unexpectedly. This can lead to denial of service, disrupting network operations and potentially causing downtime or loss of connectivity.