CVE-2025-60011
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junoss | to 22.4R3-S8 (exc) |
| juniper | junoss | to 23.2R2-S5 (exc) |
| juniper | junoss | to 23.4R2-S6 (exc) |
| juniper | junoss | to 24.2R2-S2 (exc) |
| juniper | junoss | to 24.4R2 (exc) |
| juniper | junosevolved | to 22.4R3-S8-EVO (exc) |
| juniper | junosevolved | to 23.2R2-S5-EVO (exc) |
| juniper | junosevolved | to 23.4R2-S6-EVO (exc) |
| juniper | junosevolved | to 24.2R2-S2-EVO (exc) |
| juniper | junosevolved | to 24.4R2-EVO (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-754 | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Check for Unusual or Exceptional Conditions in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. It allows an unauthenticated, network-based attacker to send a specific optional, transitive BGP attribute over an existing BGP session. The affected device erroneously modifies this attribute before propagating it to peers. When peers detect the attribute as malformed, they likely terminate the BGP sessions with the affected device, causing routing disruptions and availability impact.
How can this vulnerability impact me? :
The vulnerability can cause an availability impact by disrupting BGP sessions between devices. When peers terminate BGP sessions due to malformed attributes, it results in routing churn, which can lead to network instability and downtime for downstream devices relying on the affected routing infrastructure.