[CIVN-2025-0257] Multiple Vulnerabilities in Juniper Junos OS
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Juniper Junos OS
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Juniper Networks Junos OS 0
Juniper Networks Junos OS 23.2
Juniper Networks Junos OS 23.4
Juniper Networks Junos OS 24.2
Juniper Networks Junos OS Evolved 23.2R1-EVO
Juniper Networks Junos OS Evolved 23.4
Juniper Networks Junos OS Evolved 24.2
Juniper Networks Junos OS Evolved 24.4
Juniper Networks Junos OS 21.4
Juniper Networks Junos OS 22.2
Juniper Networks Junos OS Evolved 22.4
Juniper Networks Junos OS Evolved 23.2
Juniper Networks Junos OS 22.1
Juniper Networks Junos OS 22.3
Juniper Networks Junos OS 22.4
Juniper Networks Junos OS Evolved 22.3
Juniper Networks Junos OS 24.4
Juniper Networks Junos OS Evolved 23.2R2-EVO
Juniper Networks Junos OS Evolved 23.4R1-EVO
Juniper Networks Junos OS 23.4R2-S3
Juniper Networks Junos OS 24.2R2
Juniper Networks Junos OS 24.4R1
Juniper Networks Junos OS Evolved 23.4R2-S2-EVO
Juniper Networks Junos OS Evolved 24.2R2-EVO
Juniper Networks Junos OS Evolved 24.4R1-EVO
Overview
Multiple vulnerabilities have been reported in Juniper Junos OS which could allow a remote attacker to execute arbitrary code, bypass security restrictions, gain elevated privileges, cause denial-of-service (DoS) or disclose sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using Juniper Junos OS.
Risk Assessment:
High risk of remote code execution.
Impact Assessment:
Potential for unauthorized data access or service disruption.
Description
Juniper Junos OS is a network operating system used in Juniper Networks routers, switches, and security devices. It provides a modular, secure, and scalable platform for routing, switching, and network management.
Multiple vulnerabilities exist in Juniper Junos OS due to a buffer copy without checking size of input vulnerability in the Session Initialization Protocol (SIP) ALG, uncontrolled resource consumption, origin validation error, improper check for unusual or exceptional conditions in the Packet Forwarding Engine (PFE), access of uninitialized pointer in the routing protocol daemon (rpd), use of uninitialized resource in the Packet Forwarding Engine (PFE),a NULL pointer dereference flaw in the PFE management daemon (evo-pfemand),improper authentication validation, improper check for unusual or exceptional conditions vulnerability in the routing protocol daemon (rpd), multiple instances of OS command injection flaw in the CLI and a password aging flaw in the RADIUS client. A remote attacker could exploit these vulnerabilities by persuading a specially crafted request to gain elevated privileges on the targeted system.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, gain elevated privileges, cause denial-of-service (DoS) or disclose sensitive information on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor
https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending&f-sf_articletype=Security%20Advisories&numberOfResults=25
Vendor Information
Juniper
https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending&f-sf_articletype=Security%20Advisories&numberOfResults=25
References
Juniper
https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending&f-sf_articletype=Security%20Advisories&numberOfResults=25
CVE Name
CVE-2025-52960
CVE-2025-52961
CVE-2025-59957
CVE-2025-59958
CVE-2025-59962
CVE-2025-59964
CVE-2025-59967
CVE-2025-59980
CVE-2025-60004
CVE-2025-60006
CVE-2025-60010
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=0iQx
—–END PGP SIGNATURE—–