CVE-2025-30646Signed to Unsigned Conversion Error in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 67.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. When an LLDP telemetry subscription is active, receipt o

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.2-EVO22.2R3-S6-EVO+5
CVEListV5juniper_networks/junos_os21.421.4R3-S10+6
NVDjuniper/junos< 21.2+7

🔴Vulnerability Details

2
GHSA
GHSA-c84c-ph5v-qwvg: A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks J2025-04-09
CVEList
Junos OS and Junos OS Evolved: Receipt of a malformed LLDP TLV results in l2cpd crash2025-04-09

📋Vendor Advisories

1
Juniper
CVE-2025-30646: A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks J2025-04-09
CVE-2025-30646 — Signed to Unsigned Conversion Error | cvebase