CVE-2025-52953
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os_evolved | * |
| juniper | junos_os | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-440 | A feature, API, or function does not perform according to its specification. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Expected Behavior Violation in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. It allows an unauthenticated adjacent attacker to send a valid BGP UPDATE packet that causes a BGP session reset. Continuous receipt and processing of this packet can create a sustained Denial of Service (DoS) condition affecting both iBGP and eBGP sessions over IPv4 and IPv6.
How can this vulnerability impact me? :
The vulnerability can cause a Denial of Service (DoS) by resetting BGP sessions repeatedly. This disrupts network routing stability and availability, potentially leading to network outages or degraded network performance.