CVE-2025-52951
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Protection Mechanism Failure in the kernel filter processing of Juniper Networks Junos OS. Specifically, the 'payload-protocol' match is not supported correctly, causing firewall filter terms containing it to accept all packets without applying any filtering. As a result, an attacker sending IPv6 traffic to an interface can bypass any firewall filtering configured on that interface.
How can this vulnerability impact me? :
This vulnerability allows an attacker to bypass firewall filtering on affected Junos OS interfaces by sending specially crafted IPv6 traffic. This means unauthorized traffic can pass through the firewall, potentially leading to exposure of internal network resources, unauthorized access, or other security breaches.