CVE-2025-21602Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 68.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9

Description

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerab

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.421.4R3-S9-EVO+6
NVDjuniper/junos_os_evolved8 versions+7
CVEListV5juniper_networks/junos_os21.421.4R3-S9+6
NVDjuniper/junos8 versions+7

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Receipt of specially crafted BGP update packet causes RPD crash2025-01-09
GHSA
GHSA-v85m-7mw4-4363: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2025-01-09

📋Vendor Advisories

1
Juniper
CVE-2025-21602: An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved al2025-01-09
CVE-2025-21602 — Networks Junos OS vulnerability | cvebase