CVE-2025-59962
BaseFortify
Publication date: 2025-10-09
Last updated on: 2025-10-14
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os_evolved | * |
| juniper | junos_os | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-824 | The product accesses or uses a pointer that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Access of Uninitialized Pointer issue in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved when BGP sharding is configured. It allows an attacker to trigger indirect next-hop updates combined with timing conditions outside their control, causing the rpd process to crash and restart. This leads to a Denial of Service (DoS) condition. Specifically, continuous IGP route changes can cause repeated route re-resolution, increasing the chance of triggering the crash.
How can this vulnerability impact me? :
The vulnerability can cause the routing protocol daemon (rpd) to crash and restart repeatedly, resulting in a Denial of Service (DoS). This can disrupt network routing and availability, potentially causing network outages or degraded network performance.