CVE-2025-52958 — Reachable Assertion in Networks Junos OS
Severity
6.0MEDIUMNVD
EPSS
0.0%
top 95.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Description
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.
Continued session establishme…
CVSS vector
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
Affected Packages4 packages
🔴Vulnerability Details
2GHSA▶
GHSA-5694-q557-w4rg: A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthe↗2025-07-11
CVEList▶
Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash↗2025-07-11
📋Vendor Advisories
1Juniper▶
CVE-2025-52958: A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthe↗2025-07-11