CVE-2025-59962

CWE-8244 documents4 sources
Severity
6.0MEDIUM
EPSS
0.0%
top 95.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9

Description

An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP sharding configured allows an attacker triggering indirect next-hop updates, along with timing outside the attacker's control, to cause rpd to crash and restart, leading to a Denial of Service (DoS). With BGP sharding enabled, triggering route resolution of an indirect next-hop (e.g., an IGP route change over which a BGP route gets resolved), may cause

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.322.3R3-S3-EVO+2
CVEListV5juniper_networks/junos_os21.421.4R3-S6+5
NVDjuniper/junos< 21.4+6

🔴Vulnerability Details

2
GHSA
GHSA-qpxp-m556-4mcr: An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP shard2025-10-09
CVEList
Junos OS and Junos OS Evolved: With BGP sharding enabled, change in indirect next-hop can cause RPD crash2025-10-09

📋Vendor Advisories

1
Juniper
CVE-2025-59962: An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP shard2025-10-09
CVE-2025-59962 (MEDIUM CVSS 6) | An Access of Uninitialized Pointer | cvebase.io