VYPR
Unrated severityNVD Advisory· Published Jul 11, 2025· Updated Jul 11, 2025

Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash

CVE-2025-52958

Description

A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.

Continued session establishment failures leads to a sustained DoS condition.

This issue affects Junos OS:

  • All versions before 22.2R3-S6,
  • from 22.4 before 22.4R3-S6,
  • from 23.2 before 23.2R2-S3,
  • from 23.4 before 23.4R2-S4,
  • from 24.2 before 24.2R2;

Junos OS Evolved: * All versions before 22.2R3-S6-EVO, * from 22.4 before 22.4R3-S6-EVO, * from 23.2 before 23.2R2-S3-EVO, * from 23.4 before 23.4R2-S4-EVO, * from 24.2 before 24.2R2-EVO.

Affected products

3
  • <22.2R3-S6-EVO, >=22.4 <22.4R3-S6-EVO, >=23.2 <23.2R2-S3-EVO, >=23.4 <23.4R2-S4-EVO, >=24.2 <24.2R2-EVO+ 1 more
    • (no CPE)range: <22.2R3-S6-EVO, >=22.4 <22.4R3-S6-EVO, >=23.2 <23.2R2-S3-EVO, >=23.4 <23.4R2-S4-EVO, >=24.2 <24.2R2-EVO
    • (no CPE)range: 0
  • Range: <22.2R3-S6, >=22.4 <22.4R3-S6, >=23.2 <23.2R2-S3, >=23.4 <23.4R2-S4, >=24.2 <24.2R2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.