CVE-2025-60011

CWE-7544 documents4 sources
Severity
6.9MEDIUM
EPSS
0.0%
top 95.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an availability impact for downstream devices. When an affected device receives a specific optional, transitive BGP attribute over an existing BGP session, it will be erroneously modified before propagation to peers. When the attribute is detected as malformed by the peers, these pe

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved23.223.2R2-S5-EVO+4
CVEListV5juniper_networks/junos_os23.223.2R2-S5+4
NVDjuniper/junos< 22.4+5

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Optional transitive BGP attribute is modified before propagation to peers causing sessions to flap2026-01-15
GHSA
GHSA-9j3f-4m2h-6f2h: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS E2026-01-15

📋Vendor Advisories

1
Juniper
CVE-2025-60011: An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS E2026-01-15
CVE-2025-60011 (MEDIUM CVSS 6.9) | An Improper Check for Unusual or Ex | cvebase.io