CVE-2025-59969
Buffer Overflow in Junos OS Evolved Forwarding Causes DoS
Publication date: 2026-04-09
Last updated on: 2026-04-28
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | to 22.4 (exc) |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability is a classic buffer overflow issue in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved running on PTX Series or QFX5000 Series devices.
An unauthenticated attacker who is adjacent to the network can send specially crafted multicast packets that cause the affected line cards or devices to crash and restart.
Because the system continues to receive and process these malicious packets, the Denial of Service (DoS) condition can be sustained.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a Denial of Service (DoS) condition.
An attacker can cause affected devices or line cards to crash and restart repeatedly by sending crafted multicast packets.
This can disrupt network operations and availability, potentially causing significant service interruptions.