CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-21600: Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash

6.5 CVSS

Description

An Out-of-Bounds Read vulnerability in

the routing protocol daemon (rpd) of

Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

This issue only affects systems configured in
either of two ways:



* systems with BGP traceoptions enabled

* systems with BGP family traffic-engineering (BGP-LS)
configured

and can be exploited from a directly connected and configured BGP peer. 

This issue affects iBGP and eBGP

with

any address family

configured, and both IPv4 and IPv6 are affected by this vulnerability.

This issue affects:

Junos OS: 

*

from 21.4 before 21.4R3-S9, 
* from 22.2 before 22.2R3-S5, 
* from 22.3 before 22.3R3-S4, 
* from 22.4 before 22.4R3-S5, 
* from 23.2 before 23.2R2-S3, 
* from 23.4 before 23.4R2-S3, 
* from 24.2 before 24.2R1-S2, 24.2R2; 

Junos OS Evolved: 

* from 21.4-EVO before 21.4R3-S9-EVO, 
* from 22.2-EVO before 22.2R3-S5-EVO, 
* from 22.3-EVO before 22.3R3-S4-EVO, 
* from 22.4-EVO before 22.4R3-S5-EVO, 
* from 23.2-EVO before 23.2R2-S3-EVO, 
* from 23.4-EVO before 23.4R2-S2-EVO, 
* from 24.2-...

Classification

CVE ID: CVE-2025-21600

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.5

Affected Products

Vendor: Juniper Networks

Product: Junos OS

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.72% (scored less or equal to compared to others)

EPSS Date: 2025-02-25 (when was this score calculated)

References

https://supportportal.juniper.net/JSA92870

Timeline