CVE-2025-60007
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-03-16

Assigner: Juniper Networks, Inc.

Description
A NULL Pointer Dereference vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS on MX, SRX and EX Series allows a local attacker with low privileges to cause a Denial-of-Service (DoS). When a user executes the 'show chassis' command with specifically crafted options, chassisd will crash and restart. Due to this all components but the Routing Engine (RE) in the chassis are reinitialized, which leads to a complete service outage, which the system automatically recovers from. This issue affects: Junos OS on MX, SRX and EX Series, except MX10000 Series and MX304:Β  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-03-16
Generated
2026-05-06
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
juniper junoss to 22.4r3-s8 (exc)
juniper junoss to 23.2r2-s5 (exc)
juniper junoss to 23.4r2-s6 (exc)
juniper junoss to 24.2r2-s2 (exc)
juniper junoss to 24.4r2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL Pointer Dereference in the chassis daemon (chassisd) of Juniper Networks Junos OS on MX, SRX, and EX Series devices. A local attacker with low privileges can trigger this by executing the 'show chassis' command with specially crafted options, causing the chassisd process to crash and restart. This leads to reinitialization of all chassis components except the Routing Engine, resulting in a complete service outage until the system recovers.


How can this vulnerability impact me? :

The vulnerability can cause a Denial-of-Service (DoS) condition on affected Junos OS devices. When exploited, it causes the chassis daemon to crash and restart, leading to a temporary outage of all chassis components except the Routing Engine. This results in a complete service outage during the reinitialization period, impacting network availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Junos OS on MX, SRX, and EX Series devices to versions that have fixed the issue. Specifically, update to versions 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S6 or later, 24.2R2-S2 or later, or 24.4R2 or later, depending on your current version. Avoid allowing low-privilege users to execute the 'show chassis' command with crafted options until the update is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart