CVE-2025-52949

Severity
7.1HIGH
EPSS
0.1%
top 82.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Only systems configured for Ethernet Virtual Private Networking (EVPN) signaling

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.4-EVO22.4R3-S7-EVO+5
CVEListV5juniper_networks/junos_os22.222.2R3-S7+6
NVDjuniper/junos< 21.4+7

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed BGP update causes RPD crash2025-07-11
GHSA
GHSA-fx8c-8vrh-7hg5: An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Ev2025-07-11

📋Vendor Advisories

2
Juniper
CVE-2025-52949: An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Ev2025-07-11
Microsoft
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.2024-12-10
CVE-2025-52949 (HIGH CVSS 7.1) | An Improper Handling of Length Para | cvebase.io