CVE-2025-59969Classic Buffer Overflow in Networks Junos OS Evolved

Severity
7.1HIGHNVD
EPSS
0.0%
top 95.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateApr 10

Description

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages1 packages

CVEListV5juniper_networks/junos_os_evolved23.223.2R2-S5-EVO+10

🔴Vulnerability Details

3
GHSA
GHSA-qr7g-rj69-5948: A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of2026-04-10
VulDB
Juniper Junos OS Evolved on PTX evo-aftmand/evo-pfemand buffer overflow (JSA103159)2026-04-10
CVEList
Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will cause evo-aftmand / evo-pfemand to crash and restart2026-04-09
CVE-2025-59969 — Classic Buffer Overflow | cvebase