CVE-2025-30651

CWE-8054 documents4 sources
Severity
8.7HIGH
EPSS
0.4%
top 39.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When an attacker sends a specific ICMPv6 packet to an interface with "protocols router-advertisement" configured, rpd crashes and restarts. Continued receipt of this packet will cause a sustained DoS condition. This issue only affects systems configured with IPv6.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.4-EVO21.4R3-S10-EVO+5
CVEListV5juniper_networks/junos_os21.421.4R3-S10+5
NVDjuniper/junos< 21.2+6

🔴Vulnerability Details

2
GHSA
GHSA-pw2h-44xr-w79v: A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allow2025-04-09
CVEList
Junos OS and Junos OS Evolved: Receipt of a specific ICMPv6 packet causes a memory overrun leading to an rpd crash2025-04-09

📋Vendor Advisories

1
Juniper
CVE-2025-30651: A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allow2025-04-09
CVE-2025-30651 (HIGH CVSS 8.7) | A Buffer Access with Incorrect Leng | cvebase.io