VYPR
Unrated severityNVD Advisory· Published Jul 11, 2025· Updated Jul 15, 2025

Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message

CVE-2025-52980

Description

A Use of Incorrect Byte Ordering

vulnerability

in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.

This issue affects eBGP and iBGP over IPv4 and IPv6.

This issue affects:

Junos OS:

  • 22.1 versions from 22.1R1 before 22.2R3-S4,
  • 22.3 versions before 22.3R3-S3,
  • 22.4 versions before 22.4R3-S2,
  • 23.2 versions before 23.2R2,
  • 23.4 versions before 23.4R2.

Affected products

2
  • Range: 22.1R1 before 22.2R3-S4, 22.3 before 22.3R3-S3, 22.4 before 22.4R3-S2, 23.2 before 23.2R2, 23.4 before 23.4R2
  • Juniper Networks/Junos OSv5
    Range: 22.2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.