CVE-2025-21601

CWE-5734 documents4 sources
Severity
8.7HIGH
EPSS
0.5%
top 35.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an unauthenticated, network-based attacker, sending genuine traffic targeted to the device to cause the CPU to climb until the device becomes unresponsive. Continuous receipt of these packets will create a sustained Denial of Service (DoS) condition. This

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os22.222.2R3-S5+5
NVDjuniper/junos21.4+6

🔴Vulnerability Details

2
GHSA
GHSA-95f3-h98w-ww8w: An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 8022025-04-09
CVEList
Junos OS: SRX and EX Series, MX240, MX480, MX960, QFX5120 Series: When web management is enabled for specific services an attacker may cause a CPU spike by sending genuine packets to the device2025-04-09

📋Vendor Advisories

1
Juniper
CVE-2025-21601: An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Junip2025-04-09
CVE-2025-21601 (HIGH CVSS 8.7) | An Improper Following of Specificat | cvebase.io