CVE-2025-52953

CWE-4404 documents4 sources
Severity
7.1HIGH
EPSS
0.1%
top 83.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability. This issue affect

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.4-EVO22.4R3-S7-EVO+5
CVEListV5juniper_networks/junos_os21.421.4R3-S11+7
NVDjuniper/junos< 21.2+8

🔴Vulnerability Details

2
GHSA
GHSA-h95q-mmmp-cm4m: An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthen2025-07-11
CVEList
Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset2025-07-11

📋Vendor Advisories

1
Juniper
CVE-2025-52953: An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthen2025-07-11
CVE-2025-52953 (HIGH CVSS 7.1) | An Expected Behavior Violation vuln | cvebase.io