CVE-2025-30657Improper Encoding or Escaping of Output in Networks Junos OS

Severity
6.9MEDIUMNVD
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it's sent to SRRD it's encoded incorrectly which leads to a crash and momentary interruption of jflow processing un

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5juniper_networks/junos_os21.421.4R3-S10+4
NVDjuniper/junos< 21.2+5

🔴Vulnerability Details

2
GHSA
GHSA-75m6-45mm-wc4h: An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthentic2025-04-09
CVEList
Junos OS: Processing of a specific BGP update causes the SRRD process to crash2025-04-09

📋Vendor Advisories

1
Juniper
CVE-2025-30657: An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthentic2025-04-09
CVE-2025-30657 — Networks Junos OS vulnerability | cvebase