CVE-2025-59961

Severity
6.8MEDIUM
EPSS
0.0%
top 99.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15

Description

An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd process, resulting in complete control over the resource. This vulnerability allows any low-privileged user logged into the system to connect to the Unix socket and issue commands to manage the DHCP service, in essence, taking administrative control of

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved23.223.2R2-S5-EVO+5
CVEListV5juniper_networks/junos_os21.421.4R3-S12+8
NVDjuniper/junos< 21.2+9

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Unix socket used to control the jdhcpd process is world-writable2026-01-15
GHSA
GHSA-xvv2-r93v-qwfq: An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS E2026-01-15

📋Vendor Advisories

1
Juniper
CVE-2025-59961: An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS E2026-01-15
CVE-2025-59961 (MEDIUM CVSS 6.8) | An Incorrect Permission Assignment | cvebase.io