CVE-2025-59961
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | juniper_junos_os | to 21.2R3-S10 (exc) |
| juniper | juniper_junos_os | 22.2 |
| juniper | juniper_junos_os | From 21.4 (inc) to 21.4R3-S12 (exc) |
| juniper | juniper_junos_os | From 22.4 (inc) to 22.4R3-S8 (exc) |
| juniper | juniper_junos_os | From 23.2 (inc) to 23.2R2-S5 (exc) |
| juniper | juniper_junos_os | From 23.4 (inc) to 23.4R2-S6 (exc) |
| juniper | juniper_junos_os | From 24.2 (inc) to 24.2R2-S2 (exc) |
| juniper | juniper_junos_os | From 24.4 (inc) to 24.4R2 (exc) |
| juniper | juniper_junos_os | From 25.2 (inc) to 25.2R1-S1 (exc) |
| juniper | juniper_junos_os_evolved | to 22.4R3-S8-EVO (exc) |
| juniper | juniper_junos_os_evolved | From 23.2 (inc) to 23.2R2-S5-EVO (exc) |
| juniper | juniper_junos_os_evolved | From 23.4 (inc) to 23.4R2-S6-EVO (exc) |
| juniper | juniper_junos_os_evolved | From 24.2 (inc) to 24.2R2-S2-EVO (exc) |
| juniper | juniper_junos_os_evolved | From 24.4 (inc) to 24.4R2-EVO (exc) |
| juniper | juniper_junos_os_evolved | From 25.2 (inc) to 25.2R1-S1-EVO (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Incorrect Permission Assignment for a critical resource in the Juniper DHCP daemon (jdhcpd) on Juniper Networks Junos OS and Junos OS Evolved. It allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd process. By doing so, the user can issue commands to control the DHCP service, effectively gaining administrative control over the local DHCP server or DHCP relay.
How can this vulnerability impact me? :
The vulnerability allows any low-privileged user on the affected system to take complete control over the DHCP service by managing the jdhcpd process through the Unix socket. This can lead to unauthorized administrative actions on the DHCP server or relay, potentially disrupting network services or allowing malicious configuration changes.