CVE-2025-52985
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-07-18

Assigner: Juniper Networks, Inc.

Description
A Use of Incorrect Operator vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions. When a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with 'from prefix-list', and that prefix list contains more than 10 entries, the prefix list doesn't match and packets destined to or from the local device are not filtered. This issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output. This issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes. This issue affects Junos OS Evolved: * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO, * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO, * 24.2R2-EVO versions before 24.2R2-S1-EVO, * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO. This issue doesn't affect Junos OS Evolved versions before 23.2R1-EVO.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-07-18
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
juniper junos_os_evolved 23.4r2-s3-evo
juniper junos_os_evolved 24.2r2-evo
juniper junos_os_evolved 23.2r2-s3-evo
juniper junos_os_evolved 24.4-evo
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-480 The product accidentally uses the wrong operator, which changes the logic in security-relevant ways.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Use of Incorrect Operator issue in the Routing Engine firewall of Juniper Networks Junos OS Evolved. It allows an unauthenticated, network-based attacker to bypass security restrictions when a firewall filter applied to the lo0 or re:mgmt interface references a prefix list with 'from prefix-list' that contains more than 10 entries. In this case, the prefix list does not match, and packets destined to or from the local device are not filtered, effectively bypassing the firewall rules.


How can this vulnerability impact me? :

This vulnerability can allow an unauthenticated attacker to bypass security restrictions on the affected Junos OS Evolved devices. This means that packets to or from the local device may not be filtered as intended, potentially allowing unauthorized access or malicious traffic to pass through the firewall, which could lead to compromise of the device or network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart