CVE-2025-52980
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-07-15

Assigner: Juniper Networks, Inc.

Description
A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When aΒ BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart. This issue affects eBGP and iBGP over IPv4 and IPv6. This issue affects: Junos OS: * 22.1 versions from 22.1R1 before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2, * 23.4 versions before 23.4R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
juniper junos_os 22.4
juniper junos_os 22.3
juniper junos_os 23.2
juniper junos_os 23.4
juniper junos_os 22.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-198 The product receives input from an upstream component, but it does not account for byte ordering (e.g. big-endian and little-endian) when processing the input, causing an incorrect number or value to be used.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Use of Incorrect Byte Ordering issue in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series devices. It allows an unauthenticated attacker on the network to cause a Denial-of-Service (DoS) by sending a BGP update containing a specific, valid, optional, transitive path attribute. When rpd processes this update over an established BGP session (eBGP or iBGP, IPv4 or IPv6), it crashes and restarts.


How can this vulnerability impact me? :

The vulnerability can cause the Routing Protocol Daemon (rpd) on affected Junos OS devices to crash and restart, resulting in a Denial-of-Service (DoS). This can disrupt network routing and connectivity, potentially causing network outages or degraded performance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart