CVE-2025-52955
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-08-20
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os_evolved | * |
| juniper | junos_os | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-131 | The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Incorrect Calculation of Buffer Size in the routing protocol daemon (rpd) of Juniper Networks Junos OS. It allows an adjacent unauthenticated attacker to cause memory corruption by exploiting specific updates sent when a logical interface using a routing instance flaps continuously. This memory corruption leads to an rpd crash and restart.
How can this vulnerability impact me? :
The vulnerability can cause a sustained Denial of Service (DoS) condition by repeatedly crashing and restarting the routing protocol daemon (rpd). This can disrupt network routing and availability, potentially impacting network stability and operations.