CVE-2025-59961
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-01-15

Assigner: Juniper Networks, Inc.

Description
An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd process, resulting in complete control over the resource. This vulnerability allows any low-privileged user logged into the system to connect to the Unix socket and issue commands to manage the DHCP service, in essence, taking administrative control of the local DHCP server or DHCP relay. This issue affects: Junos OS: * all versions before 21.2R3-S10, * all versions of 22.2, * from 21.4 before 21.4R3-S12, * from 22.4 before 22.4R3-S8, * from 23.2 before 23.2R2-S5, * from 23.4 before 23.4R2-S6, * from 24.2 before 24.2R2-S2, * from 24.4 before 24.4R2, * from 25.2 before 25.2R1-S1, 25.2R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * from 23.2 before 23.2R2-S5-EVO, * from 23.4 before 23.4R2-S6-EVO, * from 24.2 before 24.2R2-S2-EVO, * from 24.4 before 24.4R2-EVO, * from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-01-15
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
juniper juniper_junos_os to 21.2R3-S10 (exc)
juniper juniper_junos_os 22.2
juniper juniper_junos_os From 21.4 (inc) to 21.4R3-S12 (exc)
juniper juniper_junos_os From 22.4 (inc) to 22.4R3-S8 (exc)
juniper juniper_junos_os From 23.2 (inc) to 23.2R2-S5 (exc)
juniper juniper_junos_os From 23.4 (inc) to 23.4R2-S6 (exc)
juniper juniper_junos_os From 24.2 (inc) to 24.2R2-S2 (exc)
juniper juniper_junos_os From 24.4 (inc) to 24.4R2 (exc)
juniper juniper_junos_os From 25.2 (inc) to 25.2R1-S1 (exc)
juniper juniper_junos_os_evolved to 22.4R3-S8-EVO (exc)
juniper juniper_junos_os_evolved From 23.2 (inc) to 23.2R2-S5-EVO (exc)
juniper juniper_junos_os_evolved From 23.4 (inc) to 23.4R2-S6-EVO (exc)
juniper juniper_junos_os_evolved From 24.2 (inc) to 24.2R2-S2-EVO (exc)
juniper juniper_junos_os_evolved From 24.4 (inc) to 24.4R2-EVO (exc)
juniper juniper_junos_os_evolved From 25.2 (inc) to 25.2R1-S1-EVO (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Incorrect Permission Assignment for a critical resource in the Juniper DHCP daemon (jdhcpd) on Juniper Networks Junos OS and Junos OS Evolved. It allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd process. By doing so, the user can issue commands to control the DHCP service, effectively gaining administrative control over the local DHCP server or DHCP relay.


How can this vulnerability impact me? :

The vulnerability allows any low-privileged user on the affected system to take complete control over the DHCP service by managing the jdhcpd process through the Unix socket. This can lead to unauthorized administrative actions on the DHCP server or relay, potentially disrupting network services or allowing malicious configuration changes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart