CVE-2025-60004
BaseFortify
Publication date: 2025-10-09
Last updated on: 2025-10-14
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os | 24.2 |
| juniper | junos_os_evolved | 23.4-evo |
| juniper | junos_os | 23.4 |
| juniper | junos_os_evolved | 24.4-evo |
| juniper | junos_os | 24.4 |
| juniper | junos_os_evolved | 24.2-evo |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-754 | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Check for Unusual or Exceptional Conditions in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. It allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS) by sending a specific BGP EVPN update message over an established BGP session, which causes the rpd process to crash and restart. The vulnerability affects both iBGP and eBGP over IPv4 and IPv6, and a BGP EVPN configuration is not required to be vulnerable, although if peers do not send BGP EVPN updates, the issue cannot occur.
How can this vulnerability impact me? :
The impact of this vulnerability is a Denial-Of-Service (DoS) condition on affected Juniper devices. An attacker can cause the routing protocol daemon (rpd) to crash and restart by sending a crafted BGP EVPN update message, potentially disrupting network routing and causing network outages or instability.