CVE-2025-52988

Severity
8.4HIGH
EPSS
0.0%
top 88.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root. When a user provides specifically crafted arguments to the 'request system logout' command, these will be executed as root on the shell, which can completely compromise the device. This issue affects: Junos OS: * all versions before 21.2R3-S9, * 2

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved23.2-EVO23.2R2-S1-EVO+2
CVEListV5juniper_networks/junos_os21.421.4R3-S8+6
NVDjuniper/junos< 21.2+7

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout'2025-07-11
GHSA
GHSA-w3xh-4xq9-g5fm: An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS an2025-07-11

📋Vendor Advisories

1
Juniper
CVE-2025-52988: An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS an2025-07-11
CVE-2025-52988 (HIGH CVSS 8.4) | An Improper Neutralization of Speci | cvebase.io