CVE-2025-52948
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-07-15

Assigner: Juniper Networks, Inc.

Description
An Improper Handling of Exceptional Conditions vulnerability in Berkeley Packet Filter (BPF) processing of Juniper Networks Junos OS allows an attacker, in rare cases, sending specific, unknown traffic patterns to cause the FPC and system to crash and restart. BPF provides a raw interface to data link layers in a protocol independent fashion. Internally within the Junos kernel, due to a rare timing issue (race condition), when a BPF instance is cloned, the newly created interface causes an internal structure leakage, leading to a system crash. The precise content and timing of the traffic patterns is indeterminate, but has been seen in a lab environment multiple times. This issue is more likely to occur when packet capturing is enabled.Β  See required configuration below. This issue affects Junos OS:Β  * all versions before 21.2R3-S9,Β  * from 21.4 before 21.4R3-S10,Β  * from 22.2 before 22.2R3-S6,Β  * from 22.4 before 22.4R3-S7,Β  * from 23.2 before 23.2R2-S3,Β  * from 23.4 before 23.4R2-S3,Β  * from 24.2 before 24.2R1-S1, 24.2R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
juniper junos 21.4
juniper junos 24.2
juniper junos 21.2r3-s9
juniper junos 23.4
juniper junos 22.4
juniper junos 22.2
juniper junos 23.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-755 The product does not handle or incorrectly handles an exceptional condition.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper handling of exceptional conditions in the Berkeley Packet Filter (BPF) processing within Juniper Networks Junos OS. Due to a rare timing issue (race condition) when a BPF instance is cloned, an internal structure leakage occurs, which can cause the Flexible PIC Concentrator (FPC) and the entire system to crash and restart. The vulnerability is triggered by sending specific, unknown traffic patterns, especially when packet capturing is enabled.


How can this vulnerability impact me? :

The vulnerability can cause the affected Junos OS system to crash and restart unexpectedly. This can lead to denial of service, disrupting network operations and potentially causing downtime or loss of connectivity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart