CVE-2025-52949
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-07-15

Assigner: Juniper Networks, Inc.

Description
An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Only systems configured for Ethernet Virtual Private Networking (EVPN) signaling are vulnerable to this issue.Β  This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects: Junos OS:Β  * all versions before 21.4R3-S11,Β  * from 22.2 before 22.2R3-S7,Β  * from 22.4 before 22.4R3-S7,Β  * from 23.2 before 23.2R2-S4,Β  * from 23.4 before 23.4R2-S5,Β  * from 24.2 before 24.2R2-S1,Β  * from 24.4 before 24.4R1-S3, 24.4R2;Β  Junos OS Evolved:Β  * all versions before 22.2R3-S7-EVO,Β  * from 22.4-EVO before 22.4R3-S7-EVO,Β  * from 23.2-EVO before 23.2R2-S4-EVO,Β  * from 23.4-EVO before 23.4R2-S5-EVO,Β  * from 24.2-EVO before 24.2R2-S1-EVO,Β  * from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
juniper junos_os_evolved *
juniper junos_os *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-130 The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Handling of Length Parameter Inconsistency in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. It allows a logically adjacent BGP peer to send a specially malformed BGP packet that causes the rpd process to crash and restart. This leads to a Denial of Service (DoS) condition that can be sustained if the malformed packets continue to be received and processed. Only systems configured for Ethernet Virtual Private Networking (EVPN) signaling are vulnerable, and it affects both iBGP and eBGP, as well as IPv4 and IPv6.


How can this vulnerability impact me? :

The vulnerability can cause the routing protocol daemon (rpd) to crash and restart repeatedly, resulting in a Denial of Service (DoS). This disrupts network routing and connectivity for affected systems, potentially causing network outages or degraded network performance. Since the issue can be sustained by continued receipt of malformed packets, it can lead to prolonged service disruption.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart