Unrated severityNVD Advisory· Published Jul 11, 2025· Updated Feb 26, 2026
Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system
CVE-2025-52954
Description
A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise.
Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system.
This issue affects Junos OS Evolved:
- All versions before 22.2R3-S7-EVO,
- from 22.4 before 22.4R3-S7-EVO,
- from 23.2 before 23.2R2-S4-EVO,
- from 23.4 before 23.4R2-S5-EVO,
- from 24.2 before 24.2R2-S1-EVO
- from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
Affected products
2Multiple ranges: before 22.2R3-S7-EVO, 22.4 before 22.4R3-S7-EVO, 23.2 before 23.2R2-S4-EVO, 23.4 before 23.4R2-S5-EVO, 24.2 before 24.2R2-S1-EVO, 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO+ 1 more
- (no CPE)range: Multiple ranges: before 22.2R3-S7-EVO, 22.4 before 22.4R3-S7-EVO, 23.2 before 23.2R2-S4-EVO, 23.4 before 23.4R2-S5-EVO, 24.2 before 24.2R2-S1-EVO, 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO
- (no CPE)range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- supportportal.juniper.net/JSA100060mitrevendor-advisory
News mentions
0No linked articles in our index yet.